Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Coruna iOS Kit Revives 2023 Exploits in New Attacks

Coruna iOS Kit Revives 2023 Exploits in New Attacks

Posted on March 26, 2026 By CWS

Coruna iOS Exploit Kit Resurfaces

The Coruna iOS exploit kit has emerged as a significant threat, utilizing an updated version of a kernel exploit initially discovered in the 2023 Operation Triangulation campaign. According to Kaspersky’s recent analysis, this kit targets vulnerabilities in Apple iOS, posing a renewed risk to users.

Kaspersky’s principal security researcher, Boris Larin, emphasized that while initial reports lacked sufficient evidence linking Coruna to the Triangulation campaign, recent findings suggest that Coruna is an evolved version of the original framework. The developers have actively maintained and expanded the codebase, adapting it for modern processors and iOS iterations.

The Evolution of Coruna

Initially reported by Google and iVerify, the Coruna kit focuses on iPhones running iOS 13.0 to 17.2.1. Although it was first utilized by a surveillance company last year, its adoption has grown, with suspected Russian actors deploying it in Ukraine via watering hole attacks. The campaign also employed fake Chinese gambling and cryptocurrency sites to distribute the PlasmaLoader malware.

The kit comprises five complete iOS exploit chains and 23 distinct exploits. Among these are CVE-2023-32434 and CVE-2023-38606, which were originally zero-day vulnerabilities in the Triangulation campaign. Kaspersky’s findings indicate that the kernel exploits in both campaigns share an author, and Coruna incorporates four additional kernel exploits, all built on a shared framework.

Technical Advancements and Implications

The code now supports Apple’s latest processors, including the A17 and M3 series, and checks for iOS 17.2 and earlier versions like 16.5 beta 4, where previous vulnerabilities were patched. This indicates the inclusion of newer exploits, adapting to the latest iOS security measures.

The attack sequence begins when a user visits a compromised website via Safari. A stager fingerprints the browser, selecting the appropriate exploit based on the browser and OS version. This leads to the execution of a payload that deploys the kernel exploit. Kaspersky notes that the payload intelligently selects the Mach-O loader, considering the device’s firmware, CPU, and permissions.

Broader Implications and Future Risks

The attack framework, initially developed for espionage, is now widely accessible, potentially endangering millions of unpatched devices. Larin warns of its modular design, which allows easy reuse, suggesting that other threat actors may soon adopt it.

In a related development, the iPhone exploit kit DarkSword has been leaked on GitHub, raising concerns about empowering more threat actors with sophisticated capabilities. As these tools become more accessible, what was once exclusive to elite hackers could now enable widespread exploitation.

The situation underscores the importance of timely security updates and vigilance among users and organizations to mitigate potential threats.

The Hacker News Tags:Apple iOS, Coruna iOS, CVE-2023-32434, CVE-2023-38606, Cybersecurity, DarkSword, data-stealing malware, exploit kit, iOS vulnerabilities, Kaspersky, kernel exploit, mobile security, Operation Triangulation, PlasmaLoader, Russian cyber attacks

Post navigation

Previous Post: Critical Flaw in Synology DSM Risks Remote Exploitation
Next Post: Critical Cisco Firewall Flaw Enables Remote Code Execution

Related Posts

Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT The Hacker News
Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access The Hacker News
Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts The Hacker News
Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain The Hacker News
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services The Hacker News
China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • BIND Updates Address Critical Security Vulnerabilities
  • Unveiling Cyber Deception: Lessons from Art Forgery
  • OpenAI Introduces AI Safety Bug Bounty Program
  • Data Breach Affects 130,000 at Hightower Holding
  • Vulnerability in Claude Extension Exposes Users to XSS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • BIND Updates Address Critical Security Vulnerabilities
  • Unveiling Cyber Deception: Lessons from Art Forgery
  • OpenAI Introduces AI Safety Bug Bounty Program
  • Data Breach Affects 130,000 at Hightower Holding
  • Vulnerability in Claude Extension Exposes Users to XSS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark