Close Menu
    2digital.news2digital.news
    • News
    • Analytics
    • Interviews
    • About us
    • Editorial board
    • Events
    2digital.news2digital.news
    Home»News»Government iPhone hacking tools fall into cybercriminal hands – experts warn of new wave of attacks
    News

    Government iPhone hacking tools fall into cybercriminal hands – experts warn of new wave of attacks

    Mikolaj LaszkiewiczBy Mikolaj LaszkiewiczMarch 4, 20262 Mins Read
    LinkedIn Twitter Threads

    The tool was first detected by security researchers at Google in February 2025 when it was used in an attempt to install spyware on an iPhone on behalf of a government client. In the following months, the same exploit toolkit appeared in a campaign attributed to a Russian espionage group and in a profit-driven operation conducted by cybercriminals operating from China.

    Coruna is particularly dangerous because it combines as many as 23 vulnerabilities in iOS that can be exploited simultaneously. The exploit chain enables device compromise through multiple attack vectors, including so-called “watering hole attacks,” where victims are infected after visiting a compromised website. Simply opening such a page or clicking a malicious link may be enough to initiate the infection process.

    According to an analysis by security firm iVerify, the tool may be linked to technologies developed by contractors working with the US government. Researchers point to similarities with components previously observed in the campaign known as Operation Triangulation, which had been associated with intelligence operations.

    Experts warn that the leak of such tools could have serious consequences for global cybersecurity. History offers similar precedents – in 2017, the leak of exploits developed by the US National Security Agency led to worldwide ransomware attacks, including the notorious WannaCry incident.

    The new findings also highlight the growing issue of the so-called “secondary exploit market,” where tools originally created for intelligence agencies eventually end up in criminal hands. Researchers warn that the more widely such technologies are used, the greater the risk that they will eventually escape government control and be deployed in attacks against ordinary users.

    Share. Twitter LinkedIn Threads

    Related Posts

    News

    Natural plant compound forces aggressive breast cancer cells into self-destruction – promising preclinical results

    March 4, 2026
    News

    New iron-based nanomaterial eliminates tumors in preclinical models

    March 3, 2026
    News

    Drone strikes hit Amazon data centers in the UAE and Bahrain – AWS services face major disruptions

    March 3, 2026
    Read more

    Let the Robot Into Your Eye?

    February 25, 2026

    When the genetic layer of the body ages — and what science is trying to do about it

    February 24, 2026

    Will We All Become Cyborgs?

    February 20, 2026
    Stay in touch
    • Twitter
    • Instagram
    • LinkedIn
    • Threads
    Demo
    X (Twitter) Instagram Threads LinkedIn
    • NEWS
    • ANALYTICS
    • INTERVIEWS
    • ABOUT US
    • EDITORIAL BOARD
    • EVENTS
    • CONTACT US
    • ©2026 2Digital. All rights reserved.
    • Privacy policy.

    Type above and press Enter to search. Press Esc to cancel.