Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Coruna Exploit Kit Targets iOS 13-17.2.1 with 23 Exploits

Coruna Exploit Kit Targets iOS 13-17.2.1 with 23 Exploits

Posted on March 4, 2026 By CWS

Introduction to the Coruna Exploit Kit

Google’s security team has uncovered a formidable exploit kit known as Coruna, which specifically targets Apple iPhones operating on iOS versions 13 to 17.2.1. The kit comprises five comprehensive exploit chains and a total of 23 exploits, as disclosed by the Google Threat Intelligence Group (GTIG). Notably, the latest iOS versions are immune to these exploits, with the initial report emerging from WIRED.

According to GTIG, Coruna’s strength lies in its extensive array of iOS exploits, many of which leverage non-public techniques and mitigation bypasses. The engineering behind this exploit framework is sophisticated, seamlessly integrating various exploit elements through common utility and exploitation frameworks.

Evolution and Distribution of Coruna

Since its debut in February 2025, the Coruna exploit kit has circulated among diverse threat actors. Initially utilized in commercial surveillance, it has transitioned to a government-sponsored attacker and ultimately to a financially driven threat actor based in China by December. The exact mechanism of its transfer remains unknown, highlighting an active market for second-hand zero-day exploits.

iVerify has drawn parallels between Coruna and previous frameworks tied to U.S. government-affiliated threat actors. The proliferation of such sophisticated spyware-grade capabilities from commercial vendors to nation-state actors and widespread criminal operations is a significant concern, according to iVerify.

Technical Insights and Exploitation Techniques

Google first encountered fragments of an iOS exploit chain used by an unnamed surveillance firm early last year. This discovery revealed a novel JavaScript framework designed to fingerprint devices, identify specific iPhone models, and ascertain iOS version details. Based on this information, the framework deploys the suitable WebKit remote code execution (RCE) exploit, followed by a pointer authentication code (PAC) bypass.

One key vulnerability involved is CVE-2024-23222, a type confusion bug in WebKit, which Apple addressed in January 2024. The framework appeared again in July 2025, observed on the domain ‘cdn.uacounter[.]com,’ embedded as a hidden iFrame on compromised Ukrainian websites. These sites, spanning industries like retail and e-commerce, were targeted by a suspected Russian espionage group, UNC6353.

Recent Developments and Security Measures

In December 2025, the Coruna exploit kit resurfaced through a cluster of fake Chinese websites, prompting users to access them via iOS devices. This activity, attributed to UNC6691, led to the discovery of a debug version of the kit and samples revealing five full iOS exploit chains targeting versions from iOS 13 to iOS 17.2.1.

The Russian government has accused the U.S. National Security Agency of utilizing this campaign to compromise thousands of Apple devices for reconnaissance purposes. Meanwhile, UNC6691 has exploited the kit to deploy a stager binary named PlasmaLoader, capable of extracting sensitive information from applications like cryptocurrency wallets.

In response to the Coruna threat, iPhone users are strongly advised to update their devices regularly and enable Lockdown Mode for enhanced protection against potential exploits.

The Hacker News Tags:Apple iOS, Coruna exploit, Cybersecurity, iOS 13-17, iOS security, iPhone vulnerabilities, Spyware, Threat Actors, WebKit vulnerabilities, zero-day exploits

Post navigation

Previous Post: VoidLink Malware Targets Kubernetes and Cloud Systems
Next Post: Zurich’s $11 Billion Acquisition to Dominate Cyberinsurance

Related Posts

Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution The Hacker News
Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms The Hacker News
Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options The Hacker News
Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks The Hacker News
New Browser Security Report Reveals Emerging Threats for Enterprises New Browser Security Report Reveals Emerging Threats for Enterprises The Hacker News
Malicious Chrome Extensions Threaten Business Security Malicious Chrome Extensions Threaten Business Security The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI-Driven Malware Targets Iraqi Officials: New Threats Emerge
  • Zurich’s $11 Billion Acquisition to Dominate Cyberinsurance
  • Coruna Exploit Kit Targets iOS 13-17.2.1 with 23 Exploits
  • VoidLink Malware Targets Kubernetes and Cloud Systems
  • LastPass Alerts Users to Phishing Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI-Driven Malware Targets Iraqi Officials: New Threats Emerge
  • Zurich’s $11 Billion Acquisition to Dominate Cyberinsurance
  • Coruna Exploit Kit Targets iOS 13-17.2.1 with 23 Exploits
  • VoidLink Malware Targets Kubernetes and Cloud Systems
  • LastPass Alerts Users to Phishing Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News