Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DarkSword iOS Kit Exploits Multiple Flaws for Device Control

DarkSword iOS Kit Exploits Multiple Flaws for Device Control

Posted on March 19, 2026 By CWS

A newly discovered exploit kit, named DarkSword, has been targeting Apple iOS devices. This kit, known for its ability to steal sensitive data, has been active since November 2025, utilized by various threat actors. Reports from Google Threat Intelligence Group (GTIG), iVerify, and Lookout highlight its deployment by commercial surveillance vendors and state-sponsored entities in countries like Saudi Arabia, Turkey, Malaysia, and Ukraine.

Targeting iOS Vulnerabilities

DarkSword marks the second iOS exploit kit identified within a month, following Coruna. Designed to compromise iPhones running iOS versions between 18.4 and 18.7, it has been attributed to a Russian espionage group, UNC6353, known for attacking Ukrainian targets. This group has previously used Coruna to inject malicious JavaScript into compromised websites, further emphasizing the ongoing risk of exploit proliferation.

The exploit kit employs six vulnerabilities, three of which are zero-days, to achieve full device control. Notable vulnerabilities include CVE-2026-20700 and CVE-2025-43529, with patches released by Apple. The kit targets crypto wallet apps, suggesting financially motivated actors behind its use.

Mechanics of the Attack

DarkSword operates by embedding malicious iFrames in websites, which load JavaScript to fingerprint and exploit iOS devices. This process allows the malware to bypass Safari’s security measures and inject code into system processes. Once the device is compromised, the malware, named GHOSTBLADE, accesses sensitive data, including emails, contacts, and more, exfiltrating it to external servers.

iVerify’s analysis reveals that the kit exploits JavaScriptCore JIT vulnerabilities to achieve remote code execution, eventually leading to kernel-level access. This sophisticated attack chain highlights the professional development effort behind DarkSword, indicating a complex and adaptable threat.

Implications and Future Outlook

The discovery of DarkSword raises concerns about the accessibility of powerful iOS exploits to financially motivated actors. The kit’s use by groups like UNC6353 and its links to other threat actors, such as UNC6748 and PARS Defense, underscore a well-funded market for such tools. These actors have been linked to attacks on Saudi Arabian and Turkish targets, exploiting iOS vulnerabilities to deploy backdoors like GHOSTKNIFE and GHOSTSABER.

As more devices remain unpatched, the risk of widespread exploitation increases. The lack of operational security in the deployment of these tools highlights significant challenges in mitigating such threats. The security community must remain vigilant to address these vulnerabilities and protect users from sophisticated cyber threats.

The Hacker News Tags:Apple vulnerabilities, cyber threats, Cybersecurity, DarkSword, device takeover, GHOSTBLADE, GHOSTKNIFE, GHOSTSABER, iOS exploit, iOS vulnerabilities, mobile security, UNC6353, zero-day exploits

Post navigation

Previous Post: Hidden Malware in Open VSX Extension Threatens Developers
Next Post: CISA Highlights SharePoint Security Vulnerability Exploitation

Related Posts

Enhancing Mobile Security with Samsung Knox Enhancing Mobile Security with Samsung Knox The Hacker News
Researchers Detect Malicious npm Package Targeting GitHub-Owned Repositories Researchers Detect Malicious npm Package Targeting GitHub-Owned Repositories The Hacker News
Why 2026 Will be the Year of Machine-Speed Security Why 2026 Will be the Year of Machine-Speed Security The Hacker News
New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operations New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operations The Hacker News
Google’s Quantum-Resistant HTTPS Initiative in Chrome Google’s Quantum-Resistant HTTPS Initiative in Chrome The Hacker News
Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Raven Secures $20M to Enhance Cloud Security Solutions
  • Enhancing Security with Ceros for Claude Code
  • Iran-Linked Botnet Unveiled Through Open Directory Leak
  • CISA Highlights SharePoint Security Vulnerability Exploitation
  • DarkSword iOS Kit Exploits Multiple Flaws for Device Control

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Raven Secures $20M to Enhance Cloud Security Solutions
  • Enhancing Security with Ceros for Claude Code
  • Iran-Linked Botnet Unveiled Through Open Directory Leak
  • CISA Highlights SharePoint Security Vulnerability Exploitation
  • DarkSword iOS Kit Exploits Multiple Flaws for Device Control

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark