Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DarkSword iOS Exploit Targets iPhone Users Worldwide

DarkSword iOS Exploit Targets iPhone Users Worldwide

Posted on March 18, 2026 By CWS

DarkSword iOS Exploit Unveiled

A sophisticated iOS exploit kit known as DarkSword has been actively used by various commercial surveillance entities and state-backed threat groups since November 2025. This exploit aims to extract sensitive personal information from iPhone users across several countries.

DarkSword utilizes a complex chain of six vulnerabilities, including four previously unknown zero-days, compromising iPhones operating on iOS versions 18.4 to 18.7.

Mechanism of the Exploit

The DarkSword exploit operates fully via JavaScript, allowing hackers to bypass Apple’s security measures such as the Page Protection Layer and Secure Page Table Monitor. This method permits the execution of unauthorized code.

Organizations like GTIG, iVerify, and Lookout have analyzed the exploit’s toolmarks, confirming its deployment in targeted attacks in Saudi Arabia, Turkey, Malaysia, and Ukraine.

Details of the Exploit Chain

The six-vulnerability chain starts with a remote code execution exploit affecting JavaScriptCore, Apple’s JavaScript engine in Safari and WebKit. It then proceeds through two sandbox escapes and a privilege escalation to execute a payload that grants hackers complete control over the device.

Among these vulnerabilities, CVE-2026-20700 involves a PAC bypass in Apple’s dynamic linker dyld, which wasn’t patched until iOS 26.3 after being reported by GTIG.

Post-Exploitation Malware Families

Following a successful DarkSword attack, three distinct malware families have been identified: GHOSTKNIFE, GHOSTSABER, and GHOSTBLADE. Each is designed for specific threat actor objectives.

GHOSTKNIFE, used by the threat group UNC6748 through a fake Snapchat site, serves as a JavaScript backdoor for extracting account information, messages, and other data. It uses encrypted communication to avoid detection.

GHOSTSABER, deployed by the Turkish firm PARS Defense, can execute over 15 commands, including data extraction and real-time geolocation, although some features require additional modules.

GHOSTBLADE, linked to Russian espionage actor UNC6353, focuses on comprehensive data mining, gathering extensive information without persistent operation. Its code hints at future capabilities with an unimplemented function named startSandworm().

UNC6748 used a disguised Snapchat site with obfuscated JavaScript loaders to deploy DarkSword, while PARS Defense enhanced security by encrypting exploit stages.

In conclusion, the DarkSword iOS exploit poses a significant threat to iPhone security, emphasizing the need for users to remain vigilant and for developers to address such vulnerabilities promptly.

Cyber Security News Tags:Apple vulnerabilities, cyber espionage, cybersecurity threats, DarkSword exploit, iOS security, iPhone hacking, JavaScript exploits, mobile security, state-sponsored attacks, zero-day vulnerabilities

Post navigation

Previous Post: XBOW Secures $120M to Enhance AI Security Platform
Next Post: EU Imposes Sanctions on Firms Linked to Cyber Attacks

Related Posts

Microsoft Eliminated High-Privilege Access to Enhance Microsoft 365 Security Microsoft Eliminated High-Privilege Access to Enhance Microsoft 365 Security Cyber Security News
Open Source CyberSOCEval Sets New Standards for AI in Malware Analysis and Threat Intelligence Open Source CyberSOCEval Sets New Standards for AI in Malware Analysis and Threat Intelligence Cyber Security News
Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys Cyber Security News
Google Down For Most Of The Users In Turkey And Eastern Europe Google Down For Most Of The Users In Turkey And Eastern Europe Cyber Security News
Windows 11 Notepad to Get AI Support for Free to Generate and Summarize Text Windows 11 Notepad to Get AI Support for Free to Generate and Summarize Text Cyber Security News
Threat Actors Claim Breach Of Huawei Technologies Source Code and Internal Tools Threat Actors Claim Breach Of Huawei Technologies Source Code and Internal Tools Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Apple Enhances Security with New Update System
  • Critical Apple WebKit Flaw Patched on iOS and macOS
  • Manifold Secures $8 Million to Enhance AI Security
  • UIDAI Initiates Bug Bounty to Enhance Aadhaar Security
  • Preemptive Security Urged as Cyber Threats Accelerate

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Apple Enhances Security with New Update System
  • Critical Apple WebKit Flaw Patched on iOS and macOS
  • Manifold Secures $8 Million to Enhance AI Security
  • UIDAI Initiates Bug Bounty to Enhance Aadhaar Security
  • Preemptive Security Urged as Cyber Threats Accelerate

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark