Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
TA446 Uses DarkSword Exploit in Spear-Phishing Campaign

TA446 Uses DarkSword Exploit in Spear-Phishing Campaign

Posted on March 28, 2026 By CWS

In a recent cybersecurity disclosure, Proofpoint has revealed a concerning email attack strategy employed by a threat group linked to Russian state interests. The attackers, identified as TA446, are utilizing the newly exposed DarkSword exploit to compromise iOS devices through targeted spear-phishing campaigns.

Russian-Linked Threat Group TA446

The group TA446, also known by names such as Callisto and COLDRIVER, is reportedly affiliated with Russia’s Federal Security Service (FSB). This entity is notorious for its spear-phishing operations aimed at acquiring credentials from high-value targets. Over the past year, TA446 has expanded its repertoire to include attacks on WhatsApp accounts and other malware tactics to steal sensitive information.

DarkSword Exploit in Action

According to Proofpoint and Malfors, the current campaign involves the use of deceptive ‘discussion invitation’ emails mimicking the Atlantic Council. These emails serve as a conduit for the GHOSTBLADE dataminer, deploying the DarkSword iOS exploit. The emails emerged from compromised accounts as of March 26, 2026, targeting figures like Leonid Volkov, a notable Russian opposition leader.

Proofpoint’s security tools detected that recipients were redirected to a harmless PDF document, a likely precaution to avoid detection, steering only iOS users to the exploit.

Implications and Wider Targeting

This marks a shift in TA446’s tactics, as they had not previously targeted Apple’s ecosystem. The adoption of DarkSword now allows these actors to exploit iOS devices effectively. The group has sent a notably higher volume of emails recently, deploying a backdoor known as MAYBEROBOT via encrypted ZIP files.

Evidence from VirusTotal and urlscan.io confirms the group’s use of DarkSword, with components like exploit loaders and code execution mechanisms identified. The breadth of targets has expanded beyond usual parameters, encompassing governmental, financial, and educational sectors, indicating a broader and more opportunistic attack campaign.

Apple’s Response and Future Considerations

In response, Apple has issued Lock Screen alerts to older iOS and iPadOS users, urging updates to counter the threat. This move highlights the severity, as Apple seeks to mitigate the risk posed by the exploit’s public leak on GitHub, which could democratize such nation-state-level threats.

Lookout’s principal researcher, Justin Albrecht, emphasized the risk posed by DarkSword’s accessibility, which may enable less sophisticated actors to execute advanced iOS attacks, challenging the perception of iPhone’s security invulnerability.

This development underscores the need for heightened vigilance in mobile security, as the landscape evolves with the proliferation of advanced exploits like DarkSword.

The Hacker News Tags:Cybersecurity, DarkSword, email security, FSB, GHOSTBLADE, iOS security, mobile threats, Proofpoint, spear-phishing, TA446

Post navigation

Previous Post: CISA Flags Critical F5 BIG-IP Vulnerability Exploitation

Related Posts

Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion The Hacker News
GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites The Hacker News
North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign The Hacker News
Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials The Hacker News
U.S. Arrests Key Facilitator in North Korean IT Worker Scheme, Seizes .74 Million U.S. Arrests Key Facilitator in North Korean IT Worker Scheme, Seizes $7.74 Million The Hacker News
The Hidden Weaknesses in AI SOC Tools that No One Talks About The Hidden Weaknesses in AI SOC Tools that No One Talks About The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • TA446 Uses DarkSword Exploit in Spear-Phishing Campaign
  • CISA Flags Critical F5 BIG-IP Vulnerability Exploitation
  • Critical Flaw in Trivy Scanner Added to CISA’s Vulnerability List
  • Cyberattack Hits European Commission’s AWS Account
  • Windows 11 Update to Block Untrusted Kernel Drivers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • TA446 Uses DarkSword Exploit in Spear-Phishing Campaign
  • CISA Flags Critical F5 BIG-IP Vulnerability Exploitation
  • Critical Flaw in Trivy Scanner Added to CISA’s Vulnerability List
  • Cyberattack Hits European Commission’s AWS Account
  • Windows 11 Update to Block Untrusted Kernel Drivers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark