Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • MAGA Is Increasingly Convinced the Trump Assassination Attempt Was Staged
    • NCAA seeks faster trial over DraftKings disputed March Madness branding case
    • AI Trusted Less Than Social Media and Airlines, With Grok Placing Last, Survey Says
    • Extragalactic Archaeology tells the ‘life story’ of a whole galaxy
    • Swedish semiconductor startup AlixLabs closes €15 million Series A to scale atomic-level etching technology
    • Republican Mutiny Sinks Trump’s Push to Extend Warrantless Surveillance
    • Yocha Dehe slams Vallejo Council over rushed casino deal approval process
    • One Rumored Color for the iPhone 18 Pro? A Rich Dark Cherry Red
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Saturday, April 18
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»Technology»A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals
    Technology

    A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals

    Editor Times FeaturedBy Editor Times FeaturedMarch 3, 2026No Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link


    Google notes that Apple patched vulnerabilities utilized by Coruna within the newest variations of its cell working system, iOS 26, so its exploitation methods are solely confirmed to work in opposition to iOS 13 by 17.2.1. It targets vulnerabilities in Apple’s Webkit framework for browsers, so Safari customers on these older variations of iOS can be susceptible, however there is no confirmed methods within the toolkit for concentrating on Chrome customers. Google additionally notes that Coruna checks if an iOS gadgets has Apple’s most stringent safety setting, referred to as Lockdown Mode, enabled, and doesn’t try and hack it in that case.

    Regardless of these limitations, iVerify says Coruna possible contaminated tens of hundreds of telephones. The corporate consulted with a companion that has entry to community visitors and counted visits to a command-and-control server for the cybercriminal model of Coruna infecting Chinese language-language web sites. The quantity of these connections counsel, iVerify says, that roughly 42,000 gadgets might have already been hacked with the toolkit within the for-profit marketing campaign alone.

    Simply what number of different victims Coruna might have hit, together with Ukrainians who visited web sites contaminated with the code by the suspected Russian espionage operation, stays unclear. Google declined to remark past its printed report. Apple didn’t instantly present touch upon Google or iVerify’s findings.

    In iVerify’s evaluation of the cybercriminal model of Coruna—it did not have entry to any of the sooner variations—the corporate discovered that the code appeared to have been altered to plant malware on course gadgets designed to empty cryptocurrency from crypto wallets in addition to steal images and, in some circumstances, emails. These additions, nonetheless, have been “poorly written” in comparison with the underlying Coruna toolkit, in accordance with iVerify chief product officer Spencer Parker, which he discovered to be impressively polished and modular.

    “My God, this stuff are very professionally written,” Parker says of the exploits included in Coruna, suggesting that the cruder malware was added by the cybercriminals who later obtained that code.

    As for the code modules that counsel Coruna’s origins as a US authorities toolkit, iVerify’s Cole notes one different clarification: It’s doable that Coruna’s code overlaps with the Operation Triangulation malware that Russia pinned on US hackers may very well be primarily based on Triangulation’s parts being picked up and repurposed after they have been found. However Cole argues that’s unlikely. Many parts of Coruna have by no means been seen earlier than, he factors out, and the entire toolkit seems to have been created by a “single creator,” as he places it.

    “The framework holds collectively very properly,” says Cole, who beforehand labored on the NSA, however notes that he is been out of the federal government for greater than a decade and is not basing any findings on his personal outdated data of US hacking instruments. “It seems prefer it was written as an entire. It doesn’t appear like it was pieced collectively.”

    If Coruna is, actually, a US hacking toolkit gone rogue, simply the way it acquired into international and felony palms stays a thriller. However Cole factors to the trade of brokers that will pay tens of tens of millions of {dollars} for zero-day hacking methods that they will resell for espionage, cybercrime, or cyberwar. Notably, Peter Williams, an government of US authorities contractor Trenchant, was sentenced this month to seven years in jail for selling hacking tools to the Russian zero-day broker Operation Zero from 2022 to 2025. Williams’ sentencing memo notes that Trenchant offered hacking instruments to the US intelligence group in addition to others within the “5 Eyes” group of English-speaking governments—the US, UK, Australia, Canada and New Zealand—although it is not clear what particular instruments he offered or what gadgets they focused.

    “These zero-day and exploit brokers are typically unscrupulous,” says Cole. “They promote to the very best bidder and so they double dip. Many don’t have exclusivity preparations. That’s very possible what occurred right here.”

    “One in all these instruments ended up within the palms of a non-Western exploit dealer, and so they offered it to whoever was prepared to pay,” Cole concludes. “The genie is out of the bottle.”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    MAGA Is Increasingly Convinced the Trump Assassination Attempt Was Staged

    April 18, 2026

    Republican Mutiny Sinks Trump’s Push to Extend Warrantless Surveillance

    April 18, 2026

    OpenAI Executive Kevin Weil Is Leaving the Company

    April 17, 2026

    Gazing Into Sam Altman’s Orb Now Proves You’re Human on Tinder

    April 17, 2026

    AI Drafting My Stories? Over My Dead Body

    April 17, 2026

    Coolfly Aura Review: More Angles, Fewer Advantages

    April 17, 2026

    Comments are closed.

    Editors Picks

    MAGA Is Increasingly Convinced the Trump Assassination Attempt Was Staged

    April 18, 2026

    NCAA seeks faster trial over DraftKings disputed March Madness branding case

    April 18, 2026

    AI Trusted Less Than Social Media and Airlines, With Grok Placing Last, Survey Says

    April 18, 2026

    Extragalactic Archaeology tells the ‘life story’ of a whole galaxy

    April 18, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Today’s NYT Connections Hints, Answers for Feb. 1, #601

    February 1, 2025

    Canva gets outdoors with $30 million Doohly acquisition

    March 25, 2026

    Documents show two DOGE employees used ChatGPT to identify National Endowment for the Humanities grants, worth over $100M, to be cut for being related to DEI (Jennifer Schuessler/New York Times)

    March 8, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.