Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DarkSword iOS Exploit Kit Targets Global iPhones

DarkSword iOS Exploit Kit Targets Global iPhones

Posted on March 18, 2026 By CWS

Security researchers have identified a new iOS exploit kit, named DarkSword, which has been actively deployed by state-sponsored hackers and commercial spyware manufacturers. This discovery highlights the ongoing threats faced by iPhone users worldwide, necessitating immediate security updates.

State-Sponsored Attacks and Commercial Exploitation

A Russian hacking group, identified as UNC6353, has been linked to the use of DarkSword in cyber attacks against Ukraine. This group is known for its previous use of the Coruna exploit kit, which targeted numerous vulnerabilities in iOS versions 13 through 17.2.1. These exploits have been primarily used in watering hole attacks, especially in the context of geopolitical tensions.

Moreover, the DarkSword kit has been used by commercial surveillance vendors, including one named UNC6748. These vendors have targeted regions like Saudi Arabia, Turkey, and Malaysia, expanding the global footprint of this exploit.

Technical Details of the DarkSword Exploit

The DarkSword exploit kit is a sophisticated tool, written completely in JavaScript, that begins its attack through Safari vulnerabilities. It achieves remote code execution by escaping browser sandboxes and exploiting kernel flaws. This process allows attackers to inject and execute further malicious payloads on the device, leading to full device compromise.

The vulnerabilities targeted by DarkSword include several critical flaws, such as CVE-2025-31277 and CVE-2025-43529, which allow attackers to manipulate memory and execute arbitrary code. Security patches for these vulnerabilities have been issued, but many devices remain at risk.

Implications for iPhone Users

Despite Apple’s efforts to patch these vulnerabilities, a significant number of iPhones remain susceptible to attacks. Researchers estimate that millions of devices running iOS versions between 18.4 and 18.6.2 are still vulnerable. Users are advised to update to the latest iOS versions, 26.3.1 and 18.7.6, to ensure their devices are protected.

In recent months, attacks utilizing DarkSword have delivered various malware payloads, including GhostBlade, GhostKnife, and GhostSaber. These payloads facilitate extensive information theft, targeting sensitive data such as passwords, messages, and even cryptocurrency wallets.

Future Outlook and Recommendations

The emergence of DarkSword underscores the evolving strategies of cybercriminals and the need for robust cybersecurity measures. Users are encouraged to remain vigilant and prioritize software updates to mitigate potential threats. The collaboration between security firms such as Google, iVerify, and Lookout is crucial in identifying and addressing these sophisticated exploits.

Ongoing research and timely updates are essential to counteract the threats posed by state-sponsored hacking groups and commercial spyware vendors. By staying informed and proactive, individuals and organizations can better protect their digital assets from future cyber threats.

Security Week News Tags:Apple patches, cyber attack, Cybersecurity, DarkSword, Google, information theft, iOS exploit, iPhone vulnerabilities, iVerify, Lookout, Malware, security researchers, Spyware, state-sponsored hacking, UNC6353

Post navigation

Previous Post: Interlock Ransomware Exploits Cisco Flaw for Root Access
Next Post: Cisco Firewall Vulnerability Used for Ransomware Attacks

Related Posts

Fortinet FortiWeb Flaw Exploited in the Wild After PoC Publication Fortinet FortiWeb Flaw Exploited in the Wild After PoC Publication Security Week News
Ingram Micro Scrambling to Restore Systems After Ransomware Attack Ingram Micro Scrambling to Restore Systems After Ransomware Attack Security Week News
In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed Security Week News
Cato Networks Acquires AI Security Firm Aim Security Cato Networks Acquires AI Security Firm Aim Security Security Week News
China Accuses US of Cyberattack on National Time Center China Accuses US of Cyberattack on National Time Center Security Week News
Canadian Tire Data Breach Exposes Millions of Accounts Canadian Tire Data Breach Exposes Millions of Accounts Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Preemptive Security Urged as Cyber Threats Accelerate
  • Enhancing SOC Triage Efficiency with ANY.RUN
  • EU Imposes Sanctions on Firms Linked to Cyber Attacks
  • DarkSword iOS Exploit Targets iPhone Users Worldwide
  • XBOW Secures $120M to Enhance AI Security Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Preemptive Security Urged as Cyber Threats Accelerate
  • Enhancing SOC Triage Efficiency with ANY.RUN
  • EU Imposes Sanctions on Firms Linked to Cyber Attacks
  • DarkSword iOS Exploit Targets iPhone Users Worldwide
  • XBOW Secures $120M to Enhance AI Security Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark