Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
TA446 Uses DarkSword Exploit in Spear-Phishing Campaign

TA446 Uses DarkSword Exploit in Spear-Phishing Campaign

Posted on March 28, 2026 By CWS

In a recent cybersecurity disclosure, Proofpoint has revealed a concerning email attack strategy employed by a threat group linked to Russian state interests. The attackers, identified as TA446, are utilizing the newly exposed DarkSword exploit to compromise iOS devices through targeted spear-phishing campaigns.

Russian-Linked Threat Group TA446

The group TA446, also known by names such as Callisto and COLDRIVER, is reportedly affiliated with Russia’s Federal Security Service (FSB). This entity is notorious for its spear-phishing operations aimed at acquiring credentials from high-value targets. Over the past year, TA446 has expanded its repertoire to include attacks on WhatsApp accounts and other malware tactics to steal sensitive information.

DarkSword Exploit in Action

According to Proofpoint and Malfors, the current campaign involves the use of deceptive ‘discussion invitation’ emails mimicking the Atlantic Council. These emails serve as a conduit for the GHOSTBLADE dataminer, deploying the DarkSword iOS exploit. The emails emerged from compromised accounts as of March 26, 2026, targeting figures like Leonid Volkov, a notable Russian opposition leader.

Proofpoint’s security tools detected that recipients were redirected to a harmless PDF document, a likely precaution to avoid detection, steering only iOS users to the exploit.

Implications and Wider Targeting

This marks a shift in TA446’s tactics, as they had not previously targeted Apple’s ecosystem. The adoption of DarkSword now allows these actors to exploit iOS devices effectively. The group has sent a notably higher volume of emails recently, deploying a backdoor known as MAYBEROBOT via encrypted ZIP files.

Evidence from VirusTotal and urlscan.io confirms the group’s use of DarkSword, with components like exploit loaders and code execution mechanisms identified. The breadth of targets has expanded beyond usual parameters, encompassing governmental, financial, and educational sectors, indicating a broader and more opportunistic attack campaign.

Apple’s Response and Future Considerations

In response, Apple has issued Lock Screen alerts to older iOS and iPadOS users, urging updates to counter the threat. This move highlights the severity, as Apple seeks to mitigate the risk posed by the exploit’s public leak on GitHub, which could democratize such nation-state-level threats.

Lookout’s principal researcher, Justin Albrecht, emphasized the risk posed by DarkSword’s accessibility, which may enable less sophisticated actors to execute advanced iOS attacks, challenging the perception of iPhone’s security invulnerability.

This development underscores the need for heightened vigilance in mobile security, as the landscape evolves with the proliferation of advanced exploits like DarkSword.

The Hacker News Tags:Cybersecurity, DarkSword, email security, FSB, GHOSTBLADE, iOS security, mobile threats, Proofpoint, spear-phishing, TA446

Post navigation

Previous Post: CISA Flags Critical F5 BIG-IP Vulnerability Exploitation
Next Post: Critical Citrix NetScaler Flaw Under Active Scrutiny

Related Posts

APT28’s Webhook Malware Targets Europe APT28’s Webhook Malware Targets Europe The Hacker News
New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto The Hacker News
Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign The Hacker News
Act Now: Prepare for Post-Quantum Cryptography Act Now: Prepare for Post-Quantum Cryptography The Hacker News
Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly The Hacker News
Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mac Users Face New Cloudflare-Themed Malware Threat
  • Critical Citrix NetScaler Flaw Under Active Scrutiny
  • TA446 Uses DarkSword Exploit in Spear-Phishing Campaign
  • CISA Flags Critical F5 BIG-IP Vulnerability Exploitation
  • Critical Flaw in Trivy Scanner Added to CISA’s Vulnerability List

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mac Users Face New Cloudflare-Themed Malware Threat
  • Critical Citrix NetScaler Flaw Under Active Scrutiny
  • TA446 Uses DarkSword Exploit in Spear-Phishing Campaign
  • CISA Flags Critical F5 BIG-IP Vulnerability Exploitation
  • Critical Flaw in Trivy Scanner Added to CISA’s Vulnerability List

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark