Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • OneOdio Focus A1 Pro review
    • The 11 Best Fans to Buy Before It Gets Hot Again (2026)
    • A look at Dylan Patel’s SemiAnalysis, an AI newsletter and research firm that expects $100M+ in 2026 revenue from subscriptions and AI supply chain research (Abram Brown/The Information)
    • ‘Euphoria’ Season 3 Release Schedule: When Does Episode 2 Come Out?
    • Francis Bacon and the Scientific Method
    • Proxy-Pointer RAG: Structure Meets Scale at 100% Accuracy with Smarter Retrieval
    • Sulfur lava exoplanet L 98-59 d defies classification
    • Hisense U7SG TV Review (2026): Better Design, Great Value
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Sunday, April 19
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»Technology»Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild
    Technology

    Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild

    Editor Times FeaturedBy Editor Times FeaturedMarch 19, 2026No Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link


    iPhone hacking methods have generally been described virtually like uncommon and elusive animals: Hackers have used them so stealthily and punctiliously towards such a small variety of hand-picked targets that they are solely not often seen within the wild. Now a current spate of espionage and cybercriminal campaigns has as an alternative deployed those self same phone-takeover instruments, embedded in contaminated web sites, to indiscriminately hack telephones by the 1000’s. And one new method particularly—able to taking up any of lots of of tens of millions of iOS devices—has appeared on the internet in an simply reusable type, placing a big fraction of the world’s iPhone customers in danger.

    Researchers at Google and cybersecurity companies iVerify and Lookout on Wednesday jointly revealed the discovery of a complicated iPhone hacking method often known as DarkSword that they’ve seen in use on contaminated web sites, able to immediately and silently hacking iOS gadgets that go to these websites. Whereas the method does not have an effect on the most recent, up to date variations of iOS, it does work towards iOS gadgets operating variations of Apple’s earlier working system launch, iOS 18, which as of final month nonetheless accounted for near 1 / 4 of iPhones, according to Apple’s own count.

    “An unlimited variety of iOS customers might have all of their private information stolen merely for visiting a preferred web site,” says Rocky Cole, iVerify’s cofounder and CEO. “A whole lot of tens of millions of people who find themselves nonetheless utilizing older Apple gadgets or older working system variations stay susceptible.”

    The iPhone-hacking marketing campaign that used DarkSword has come to gentle simply two weeks after the revelation of one other, much more refined and totally featured hacking toolkit known as Coruna was present in use by what Google describes as a Russian state-sponsored espionage group and different hacker teams. Though DarkSword seems to have been created by totally different builders from Coruna, the researchers discovered that it was utilized by those self same Russian spies. Like Coruna, it too was embedded in parts of in any other case authentic Ukrainian web sites, together with on-line information shops and a authorities company web site, to reap information from guests’ telephones.

    Past this Russian spy marketing campaign, in keeping with Google, DarkSword was noticed earlier when hackers used it to compromise the telephones of victims in Saudi Arabia, Turkey, and Malaysia. Within the case of the Turkish and Malaysian targets, Google writes in its weblog put up that prospects of the Turkish safety and surveillance agency PARS Protection seem to have used the intrusion software. All of that means that DarkSword has already proliferated to a number of totally different hacking teams, Google says, and extra are prone to undertake it.

    The truth is, iVerify cofounder and researcher Matthias Frielingsdorf notes that the Russian hackers who most lately used DarkSword of their espionage marketing campaign left the complete, unobscured DarkSword code—full with explanatory feedback in English that describe every element and embody the “DarkSword” title for the software—out there on these websites for anybody to entry and reuse. That carelessness, he says, virtually invitations different hackers to select up the software and goal different iPhone customers. “Anybody who manually grabbed all of the totally different components of the exploit might put them onto their very own internet server and begin infecting telephones. It is so simple as that,” says Frielingsdorf. “It is all properly documented, additionally. It is actually too simple.”

    An Apple spokesperson informed WIRED in a press release that “daily Apple’s safety groups around the globe work tirelessly to guard customers’ gadgets and information,” and famous that Apple had launched safety updates that will shield customers from each Coruna and DarkSword, together with emergency updates launched final week for older gadgets that may’t run iOS 26. “Maintaining software program updated stays the one most essential factor customers can do to keep up the excessive safety of their Apple gadgets,” the assertion reads. Customers who allow iOS’s strictest safety setting often known as Lockdown Mode are additionally protected, the corporate added.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    The 11 Best Fans to Buy Before It Gets Hot Again (2026)

    April 19, 2026

    Hisense U7SG TV Review (2026): Better Design, Great Value

    April 19, 2026

    Best Meta Glasses (2026): Ray-Ban, Oakley, AR

    April 19, 2026

    How Can Astronauts Tell How Fast They’re Going?

    April 19, 2026

    The ‘Lonely Runner’ Problem Only Appears Simple

    April 19, 2026

    Asus TUF Gaming A14 (2026) Review: GPU-Less Gaming Laptop

    April 19, 2026

    Comments are closed.

    Editors Picks

    OneOdio Focus A1 Pro review

    April 19, 2026

    The 11 Best Fans to Buy Before It Gets Hot Again (2026)

    April 19, 2026

    A look at Dylan Patel’s SemiAnalysis, an AI newsletter and research firm that expects $100M+ in 2026 revenue from subscriptions and AI supply chain research (Abram Brown/The Information)

    April 19, 2026

    ‘Euphoria’ Season 3 Release Schedule: When Does Episode 2 Come Out?

    April 19, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Today’s NYT Wordle Hints, Answer and Help for March 14 #1729

    March 14, 2026

    OpenAI confirms Andrea Vallone, the head of an OpenAI safety research team that works on ChatGPT’s mental health responses, is set to leave at the end of 2025 (Maxwell Zeff/Wired)

    November 24, 2025

    Blocking Cancer’s Taste Receptors Fights Drug Resistance

    November 8, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.