Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Coruna iOS Kit Revives 2023 Exploits in New Attacks

Coruna iOS Kit Revives 2023 Exploits in New Attacks

Posted on March 26, 2026 By CWS

Coruna iOS Exploit Kit Resurfaces

The Coruna iOS exploit kit has emerged as a significant threat, utilizing an updated version of a kernel exploit initially discovered in the 2023 Operation Triangulation campaign. According to Kaspersky’s recent analysis, this kit targets vulnerabilities in Apple iOS, posing a renewed risk to users.

Kaspersky’s principal security researcher, Boris Larin, emphasized that while initial reports lacked sufficient evidence linking Coruna to the Triangulation campaign, recent findings suggest that Coruna is an evolved version of the original framework. The developers have actively maintained and expanded the codebase, adapting it for modern processors and iOS iterations.

The Evolution of Coruna

Initially reported by Google and iVerify, the Coruna kit focuses on iPhones running iOS 13.0 to 17.2.1. Although it was first utilized by a surveillance company last year, its adoption has grown, with suspected Russian actors deploying it in Ukraine via watering hole attacks. The campaign also employed fake Chinese gambling and cryptocurrency sites to distribute the PlasmaLoader malware.

The kit comprises five complete iOS exploit chains and 23 distinct exploits. Among these are CVE-2023-32434 and CVE-2023-38606, which were originally zero-day vulnerabilities in the Triangulation campaign. Kaspersky’s findings indicate that the kernel exploits in both campaigns share an author, and Coruna incorporates four additional kernel exploits, all built on a shared framework.

Technical Advancements and Implications

The code now supports Apple’s latest processors, including the A17 and M3 series, and checks for iOS 17.2 and earlier versions like 16.5 beta 4, where previous vulnerabilities were patched. This indicates the inclusion of newer exploits, adapting to the latest iOS security measures.

The attack sequence begins when a user visits a compromised website via Safari. A stager fingerprints the browser, selecting the appropriate exploit based on the browser and OS version. This leads to the execution of a payload that deploys the kernel exploit. Kaspersky notes that the payload intelligently selects the Mach-O loader, considering the device’s firmware, CPU, and permissions.

Broader Implications and Future Risks

The attack framework, initially developed for espionage, is now widely accessible, potentially endangering millions of unpatched devices. Larin warns of its modular design, which allows easy reuse, suggesting that other threat actors may soon adopt it.

In a related development, the iPhone exploit kit DarkSword has been leaked on GitHub, raising concerns about empowering more threat actors with sophisticated capabilities. As these tools become more accessible, what was once exclusive to elite hackers could now enable widespread exploitation.

The situation underscores the importance of timely security updates and vigilance among users and organizations to mitigate potential threats.

The Hacker News Tags:Apple iOS, Coruna iOS, CVE-2023-32434, CVE-2023-38606, Cybersecurity, DarkSword, data-stealing malware, exploit kit, iOS vulnerabilities, Kaspersky, kernel exploit, mobile security, Operation Triangulation, PlasmaLoader, Russian cyber attacks

Post navigation

Previous Post: Critical Flaw in Synology DSM Risks Remote Exploitation
Next Post: Critical Cisco Firewall Flaw Enables Remote Code Execution

Related Posts

New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits The Hacker News
Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure The Hacker News
CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users The Hacker News
Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI The Hacker News
Building Cyber Resilience in Financial Services Building Cyber Resilience in Financial Services The Hacker News
Salesforce Patches Critical ForcedLeak Bug Exposing CRM Data via AI Prompt Injection Salesforce Patches Critical ForcedLeak Bug Exposing CRM Data via AI Prompt Injection The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Data Breach Affects 130,000 at Hightower Holding
  • Vulnerability in Claude Extension Exposes Users to XSS Attacks
  • Silver Fox Exploits EV Certificates in Malware Attack
  • Chinese Cyber Threats Breach Global Telecom Systems
  • Validate Security Measures Against Real Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Data Breach Affects 130,000 at Hightower Holding
  • Vulnerability in Claude Extension Exposes Users to XSS Attacks
  • Silver Fox Exploits EV Certificates in Malware Attack
  • Chinese Cyber Threats Breach Global Telecom Systems
  • Validate Security Measures Against Real Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark