Close Menu
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
  • Home
  • News
    • Politics
    • Legal & Courts
    • Tech & Big Tech
    • Campus & Education
    • Media & Culture
    • Global Free Speech
  • Opinions
    • Debates
  • Video/Live
  • Community
  • Freedom Index
  • About
    • Mission
    • Contact
    • Support
Trending

Stablecoin Inflows Rebound as Yield Debate Stalls US Market Structure Bill

3 minutes ago

Brickbat: Not Getting the Full Picture

40 minutes ago

Bitcoin trading firm suggests a bullish BTC strategy with a key financing twist

1 hour ago
Facebook X (Twitter) Instagram
Facebook X (Twitter) Discord Telegram
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
Market Data Newsletter
Thursday, March 5
  • Home
  • News
    • Politics
    • Legal & Courts
    • Tech & Big Tech
    • Campus & Education
    • Media & Culture
    • Global Free Speech
  • Opinions
    • Debates
  • Video/Live
  • Community
  • Freedom Index
  • About
    • Mission
    • Contact
    • Support
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
Home»Cryptocurrency & Free Speech Finance»Apple iPhone Hacking Kit Used By Spies, Crypto Scams Could Have US Intelligence Origins
Cryptocurrency & Free Speech Finance

Apple iPhone Hacking Kit Used By Spies, Crypto Scams Could Have US Intelligence Origins

News RoomBy News Room2 hours agoNo Comments3 Mins Read998 Views
Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email VKontakte Telegram
Apple iPhone Hacking Kit Used By Spies, Crypto Scams Could Have US Intelligence Origins
Share
Facebook Twitter Pinterest Email Copy Link

Listen to the article

0:00
0:00

Key Takeaways

Playback Speed

Select a Voice

In brief

  • Google has identified a sophisticated iOS exploit kit called Coruna containing 23 exploits.
  • The toolkit was used by suspected Russian spies and Chinese crypto scammers.
  • Security firm iVerify says clues in the code suggest it may have originated from a U.S. intelligence contractor.

Google’s Threat Intelligence Group (GTIG) has uncovered a powerful iPhone hacking toolkit capable of infecting devices when a user visits a malicious website, meaning malware can be transferred without anything being clicked on by the target.

The framework, dubbed “Coruna,” includes five full iOS exploit chains and 23 vulnerabilities targeting iPhones running iOS 13 through 17.2.1. Researchers said some of the exploits rely on previously unseen techniques to bypass Apple’s security protections.

Coruna exploit kit is targeting iOS.

Coruna leverages 23 exploits against Apple devices running iOS 13-17.2.1. It is being used for espionage, and by financially motivated actors to steal crypto.

Update your iOS devices, and learn more about this threat: https://t.co/c7QRDPWMKI pic.twitter.com/l8rK9ZOLsw

— Mandiant (part of Google Cloud) (@Mandiant) March 3, 2026

GTIG first identified parts of the toolkit in early 2025 in an exploit chain used by a customer of an unnamed commercial surveillance vendor. The code used a JavaScript framework that fingerprinted devices to determine the iPhone model and operating system version before delivering a tailored exploit.

The same framework later appeared on compromised Ukrainian websites in mid‑2025. Google attributed that campaign to UNC6353, a suspected Russian espionage group, which used hidden iframes to selectively target visiting iPhone users.

Later in the year, researchers discovered the toolkit again on hundreds of Chinese‑language websites tied to cryptocurrency and finance scams. Those sites attempted to lure victims to visit using iOS devices before injecting the exploit kit.

The report said vulnerabilities used by Coruna have since been patched in newer versions of Apple’s mobile operating system and urged users to update their devices. The exploit kit does not work against the latest versions of iOS.

Possible U.S. origins

While GITG’s report does not identify the original surveillance vendor customer or who may have developed the kit, researchers for mobile security firm iVerify researchers said elements of the code suggest possible U.S. origins.

“It’s highly sophisticated, took millions of dollars to develop, and it bears the hallmarks of other modules that have been publicly attributed to the U.S. government,” iVerify co-founder Rocky Cole told WIRED. He added that it was the first example uncovered by the firm of “very likely U.S. government tools” being adopted by adversaries and cybercriminal groups after “spinning out of control.”

iVerify estimated roughly 42,000 devices in just one campaign were compromised after analyzing traffic to command‑and‑control servers linked to Chinese‑language scam websites distributing the exploits.

The toolkit targets vulnerabilities in Apple’s WebKit browser engine and includes a loader that deploys different exploit chains depending on the device model and operating system version. Payloads are encrypted, compressed and delivered in a custom file format designed to evade detection.

“iPhone users are strongly urged to update their devices to the latest version of iOS,” GTIG said, adding that Apple’s Lockdown Mode can provide additional protection if updating is not possible.

Daily Debrief Newsletter

Start every day with the top news stories right now, plus original features, a podcast, videos and more.



Read the full article here

Fact Checker

Verify the accuracy of this article using AI-powered analysis and real-time sources.

Get Your Fact Check Report

Enter your email to receive detailed fact-checking analysis

5 free reports remaining

Continue with Full Access

You've used your 5 free reports. Sign up for unlimited access!

Already have an account? Sign in here

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Telegram Copy Link
News Room
  • Website
  • Facebook
  • X (Twitter)
  • Instagram
  • LinkedIn

The FSNN News Room is the voice of our in-house journalists, editors, and researchers. We deliver timely, unbiased reporting at the crossroads of finance, cryptocurrency, and global politics, providing clear, fact-driven analysis free from agendas.

Related Articles

Cryptocurrency & Free Speech Finance

Stablecoin Inflows Rebound as Yield Debate Stalls US Market Structure Bill

3 minutes ago
Media & Culture

Brickbat: Not Getting the Full Picture

40 minutes ago
Cryptocurrency & Free Speech Finance

Bitcoin trading firm suggests a bullish BTC strategy with a key financing twist

1 hour ago
Cryptocurrency & Free Speech Finance

US Bitcoin ETFs Post $462 Million Inflows as BTC Tops $73K

1 hour ago
Cryptocurrency & Free Speech Finance

MrBeast Video Editor Fired From Beast Industries Following Kalshi Insider Trading Probe

1 hour ago
Cryptocurrency & Free Speech Finance

The rally is nearing a two-year ‘make or break’ price zone

2 hours ago
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Brickbat: Not Getting the Full Picture

40 minutes ago

Bitcoin trading firm suggests a bullish BTC strategy with a key financing twist

1 hour ago

US Bitcoin ETFs Post $462 Million Inflows as BTC Tops $73K

1 hour ago

MrBeast Video Editor Fired From Beast Industries Following Kalshi Insider Trading Probe

1 hour ago
Latest Posts

Journalism is not ‘doxxing’: The push to redefine reporting as harassment

2 hours ago

The rally is nearing a two-year ‘make or break’ price zone

2 hours ago

Crypto Scams Using ‘Powerful’ iPhone Exploit Kit: Google

2 hours ago

Subscribe to News

Get the latest news and updates directly to your inbox.

At FSNN – Free Speech News Network, we deliver unfiltered reporting and in-depth analysis on the stories that matter most. From breaking headlines to global perspectives, our mission is to keep you informed, empowered, and connected.

FSNN.net is owned and operated by GlobalBoost Media
, an independent media organization dedicated to advancing transparency, free expression, and factual journalism across the digital landscape.

Facebook X (Twitter) Discord Telegram
Latest News

Stablecoin Inflows Rebound as Yield Debate Stalls US Market Structure Bill

3 minutes ago

Brickbat: Not Getting the Full Picture

40 minutes ago

Bitcoin trading firm suggests a bullish BTC strategy with a key financing twist

1 hour ago

Subscribe to Updates

Get the latest news and updates directly to your inbox.

© 2026 GlobalBoost Media. All Rights Reserved.
  • Privacy Policy
  • Terms of Service
  • Our Authors
  • Contact

Type above and press Enter to search. Press Esc to cancel.

🍪

Cookies

We and our selected partners wish to use cookies to collect information about you for functional purposes and statistical marketing. You may not give us your consent for certain purposes by selecting an option and you can withdraw your consent at any time via the cookie icon.

Cookie Preferences

Manage Cookies

Cookies are small text that can be used by websites to make the user experience more efficient. The law states that we may store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies, we need your permission. This site uses various types of cookies. Some cookies are placed by third party services that appear on our pages.

Your permission applies to the following domains:

  • https://fsnn.net
Necessary
Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.
Statistic
Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.
Preferences
Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.
Marketing
Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.