Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
iPhone Exploit Toolkit Linked to U.S. Contractor Used by Russian Spies

iPhone Exploit Toolkit Linked to U.S. Contractor Used by Russian Spies

Posted on March 10, 2026 By CWS

An advanced iPhone exploit toolkit known as ‘Coruna’, originally developed for Western intelligence purposes by U.S. contractor L3Harris, has reportedly been obtained by Russian espionage agents and Chinese cybercriminals. This development raises significant concerns within the cybersecurity community.

Origins and Development of the Coruna Toolkit

The Coruna toolkit comprises 23 hacking modules specifically designed to target Apple iPhones. This sophisticated set of tools was developed by Trenchant, the hacking division of U.S. military contractor L3Harris, intended for use by the United States and its allies in the Five Eyes intelligence alliance.

The toolkit’s integrity was compromised when Peter Williams, a former general manager at Trenchant, allegedly stole eight critical components. Between 2022 and 2025, Williams sold these tools for $1.3 million to Operation Zero, a Russian entity known for dealing in exploits.

Unauthorized Distribution and Use

After acquiring the Coruna toolkit, Operation Zero reportedly redistributed the exploits to unauthorized users. This allowed a Russian espionage group identified by Google as UNC6353 to use Coruna in targeted attacks on Ukrainian iPhone users. Eventually, the toolkit made its way into the hands of Chinese cybercrime groups, who utilized it in extensive campaigns to steal financial assets, including cryptocurrency.

Technical Details and Security Implications

Coruna targets iPhone models with iOS versions ranging from 13 to 17.2.1, according to confirmations from Google and security firm iVerify. The toolkit bears a strong resemblance to the Operation Triangulation hacking campaign, which was revealed by Kaspersky in 2023.

In particular, Coruna incorporates two significant exploits: Photon and Gallium. Photon, linked to CVE-2023-32434, exploits a privilege-escalation flaw involving memory mapping, while Gallium, associated with CVE-2023-38606, targets hardware to bypass Apple’s Page Protection Layer.

The internal names of these exploits, such as Cassowary and Sparrow, mirror the naming conventions used by L3Harris, suggesting a connection. Moreover, Kaspersky’s logo for Operation Triangulation bears a resemblance to that of L3Harris, hinting at the contractor’s involvement.

The leak of these exploits underscores the dangers posed when state-level cyberweapons are exposed to criminal networks. The mechanisms by which these tools spread remain unclear, emphasizing the need for stringent cybersecurity measures.

Stay informed with the latest updates in cybersecurity by following us on Google News, LinkedIn, and X. Reach out to us if you have stories to share.

Cyber Security News Tags:Cybercrime, Cybersecurity, exploit toolkit, Five Eyes, iOS vulnerabilities, iPhone, L3Harris, Operation Zero, Russian spies, zero-day exploits

Post navigation

Previous Post: OpenAI Introduces Advanced AI Vulnerability Scanner
Next Post: LeakyLooker Flaws in Google Looker Studio Exposed

Related Posts

Google Drive Desktop for Windows Vulnerability Grants Full Access to Another User’s Drive Google Drive Desktop for Windows Vulnerability Grants Full Access to Another User’s Drive Cyber Security News
Malicious Chrome Extension as Ethereum Wallet Enables Full Wallet Takeover Malicious Chrome Extension as Ethereum Wallet Enables Full Wallet Takeover Cyber Security News
New EDR-Redir Tool Breaks EDR Exploiting Bind Filter and Cloud Filter Driver New EDR-Redir Tool Breaks EDR Exploiting Bind Filter and Cloud Filter Driver Cyber Security News
Dark Web Omertà Market Shut Downed Following the Leak of Real Server IPs Dark Web Omertà Market Shut Downed Following the Leak of Real Server IPs Cyber Security News
LocalGPT: Secure AI Assistant Built with Rust LocalGPT: Secure AI Assistant Built with Rust Cyber Security News
Malicious Bing Ads deploy Weaponized PuTTY to Exploit Kerberos and Attack Active Directory services Malicious Bing Ads deploy Weaponized PuTTY to Exploit Kerberos and Attack Active Directory services Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • APT28 Deploys BEARDSHELL and COVENANT in Ukraine Espionage
  • Kali Linux Boosts Offline AI Penetration Testing
  • Kai Secures $125M to Enhance AI-Powered Cybersecurity
  • LeakyLooker Flaws in Google Looker Studio Exposed
  • iPhone Exploit Toolkit Linked to U.S. Contractor Used by Russian Spies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • APT28 Deploys BEARDSHELL and COVENANT in Ukraine Espionage
  • Kali Linux Boosts Offline AI Penetration Testing
  • Kai Secures $125M to Enhance AI-Powered Cybersecurity
  • LeakyLooker Flaws in Google Looker Studio Exposed
  • iPhone Exploit Toolkit Linked to U.S. Contractor Used by Russian Spies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News