Hackers target iPhones with new exploit kit from Google and iVerify, raising security fears

Hackers target iPhones with new exploit kit from Google and iVerify, raising security fears

Coruna exploits 23 vulnerabilities across iOS 13 to 17.2.1, targeting older iPhones for data theft, revealing a dangerous blend of criminal and state-sponsored hacking.

NeboAI I summarize the news with data, figures and context
IN 30 SECONDS

IN 1 SENTENCE

SENTIMENT
Neutral

𒀭
NeboAI is working, please wait...
Preparing detailed analysis
Quick summary completed
Extracting data, figures and quotes...
Identifying key players and context
DETAILED ANALYSIS
SHARE

NeboAI produces automated editions of journalistic texts in the form of summaries and analyses. Its experimental results are based on artificial intelligence. As an AI edition, texts may occasionally contain errors, omissions, incorrect data relationships and other unforeseen inaccuracies. We recommend verifying the content.

Details have emerged regarding an exploit kit named Coruna, which poses a significant threat to iPhones operating on older versions of iOS, specifically from iOS 13 to iOS 17.2.1. This kit exploits a total of 23 vulnerabilities through five full iOS exploit chains, as highlighted in a recent post by Google's Threat Intelligence Group on the Google Cloud Blog.

The mechanism of Coruna involves visiting a malicious website where hidden JavaScript assesses the device's security settings. This allows the exploit to navigate around essential iOS protections, potentially granting high-level privileges to install malware capable of data collection or downloading additional harmful modules. Notably, the exploit is designed to abort if the device is in Lockdown Mode or if the user is browsing in private mode.

Furthermore, iVerify, a mobile security firm, has indicated that the design of Coruna appears to derive from tools associated with the US government, suggesting a troubling intersection of cybercrime and state-sponsored hacking. Their analysis indicates that this represents the first widespread exploitation of mobile devices, including iOS, by a criminal organization utilizing nation-state tools.

Want to read the full article? Access the original article with all the details.
Read Original Article
TL;DR

This article is an original summary for informational purposes. Image credits and full coverage at the original source. · View Content Policy

Editorial
Editorial Staff

Our editorial team works around the clock to bring you the latest tech news, trends, and insights from the industry. We cover everything from artificial intelligence breakthroughs to startup funding rounds, gadget launches, and cybersecurity threats. Our mission is to keep you informed with accurate, timely, and relevant technology coverage.

Press Enter to search or ESC to close