Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
iPhone Exploit Toolkit Linked to U.S. Contractor Used by Russian Spies

iPhone Exploit Toolkit Linked to U.S. Contractor Used by Russian Spies

Posted on March 10, 2026 By CWS

An advanced iPhone exploit toolkit known as ‘Coruna’, originally developed for Western intelligence purposes by U.S. contractor L3Harris, has reportedly been obtained by Russian espionage agents and Chinese cybercriminals. This development raises significant concerns within the cybersecurity community.

Origins and Development of the Coruna Toolkit

The Coruna toolkit comprises 23 hacking modules specifically designed to target Apple iPhones. This sophisticated set of tools was developed by Trenchant, the hacking division of U.S. military contractor L3Harris, intended for use by the United States and its allies in the Five Eyes intelligence alliance.

The toolkit’s integrity was compromised when Peter Williams, a former general manager at Trenchant, allegedly stole eight critical components. Between 2022 and 2025, Williams sold these tools for $1.3 million to Operation Zero, a Russian entity known for dealing in exploits.

Unauthorized Distribution and Use

After acquiring the Coruna toolkit, Operation Zero reportedly redistributed the exploits to unauthorized users. This allowed a Russian espionage group identified by Google as UNC6353 to use Coruna in targeted attacks on Ukrainian iPhone users. Eventually, the toolkit made its way into the hands of Chinese cybercrime groups, who utilized it in extensive campaigns to steal financial assets, including cryptocurrency.

Technical Details and Security Implications

Coruna targets iPhone models with iOS versions ranging from 13 to 17.2.1, according to confirmations from Google and security firm iVerify. The toolkit bears a strong resemblance to the Operation Triangulation hacking campaign, which was revealed by Kaspersky in 2023.

In particular, Coruna incorporates two significant exploits: Photon and Gallium. Photon, linked to CVE-2023-32434, exploits a privilege-escalation flaw involving memory mapping, while Gallium, associated with CVE-2023-38606, targets hardware to bypass Apple’s Page Protection Layer.

The internal names of these exploits, such as Cassowary and Sparrow, mirror the naming conventions used by L3Harris, suggesting a connection. Moreover, Kaspersky’s logo for Operation Triangulation bears a resemblance to that of L3Harris, hinting at the contractor’s involvement.

The leak of these exploits underscores the dangers posed when state-level cyberweapons are exposed to criminal networks. The mechanisms by which these tools spread remain unclear, emphasizing the need for stringent cybersecurity measures.

Stay informed with the latest updates in cybersecurity by following us on Google News, LinkedIn, and X. Reach out to us if you have stories to share.

Cyber Security News Tags:Cybercrime, Cybersecurity, exploit toolkit, Five Eyes, iOS vulnerabilities, iPhone, L3Harris, Operation Zero, Russian spies, zero-day exploits

Post navigation

Previous Post: OpenAI Introduces Advanced AI Vulnerability Scanner
Next Post: LeakyLooker Flaws in Google Looker Studio Exposed

Related Posts

Hundreds of WordPress Websites Hacked By VexTrio Viper Group to Run Massive TDS Services Hundreds of WordPress Websites Hacked By VexTrio Viper Group to Run Massive TDS Services Cyber Security News
Google Warns of CL0P Ransomware Group Actively Exploiting Oracle E-Business Suite Zero-Day Google Warns of CL0P Ransomware Group Actively Exploiting Oracle E-Business Suite Zero-Day Cyber Security News
ExpressVPN Windows Client Vulnerability Exposes Users Real IP Addresses With RDP Connection ExpressVPN Windows Client Vulnerability Exposes Users Real IP Addresses With RDP Connection Cyber Security News
PoC Exploit Released for Linux-PAM Vulnerability Allowing Root Privilege Escalation PoC Exploit Released for Linux-PAM Vulnerability Allowing Root Privilege Escalation Cyber Security News
Critical Juniper Networks Flaw Risks PTX Series Routers Critical Juniper Networks Flaw Risks PTX Series Routers Cyber Security News
Ivanti EPMM Exploited by Single IP with RCE Vulnerability Ivanti EPMM Exploited by Single IP with RCE Vulnerability Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Agents Excel in Marketplace, Reveal Key Challenges
  • OpenAI Launches Bio Bug Bounty for GPT-5.5 AI Safety
  • China’s GopherWhisper APT Exploits Legitimate Services
  • Early Cyber Weapon ‘fast16’ Revealed by Researchers
  • Microsoft Fixes Vulnerability in Entra Agent ID Administration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Agents Excel in Marketplace, Reveal Key Challenges
  • OpenAI Launches Bio Bug Bounty for GPT-5.5 AI Safety
  • China’s GopherWhisper APT Exploits Legitimate Services
  • Early Cyber Weapon ‘fast16’ Revealed by Researchers
  • Microsoft Fixes Vulnerability in Entra Agent ID Administration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark