Close Menu
Newstech24.com
  • Home
  • News
  • Technology
  • Economy & Business
  • Sports News
What's Hot

Bayern Munich vs. PSG: UCL Semi-Final Showdown – Every Goal, Every Stat, Live!

06/05/2026

Air Force Unleashes Massive EA-37 Fleet Surge: Dominating the Electronic Battlefield

06/05/2026

SpaceX’s $119 Billion ‘Terafab’ Bet: Building a Chip Powerhouse in Texas

06/05/2026
Facebook X (Twitter) Instagram
Wednesday, May 6
Facebook X (Twitter) Instagram
Newstech24.com
  • Home
  • News
  • Technology
  • Economy & Business
  • Sports News
Newstech24.com
Home - Technology - Government’s iPhone Attack Kit Weaponized by Cybercriminals
Technology

Government’s iPhone Attack Kit Weaponized by Cybercriminals

By Admin03/03/2026Updated:11/03/2026No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
A suite of government hacking tools targeting iPhones is now being used by cybercriminals
Share
Facebook Twitter LinkedIn Pinterest Email

Cybersecurity investigators have uncovered a collection of potent intrusion instruments, reportedly capable of breaching Apple iPhones running outmoded software. These tools, they contend, have transitioned from a state client into the hands of malicious digital actors.

On Tuesday, Google disclosed that it initially detected the exploitation suite, known as Coruna, in February 2025. This occurred during a monitoring provider’s effort to infiltrate a mobile device with malicious software at the behest of a governmental agency. Months subsequent, the identical exploit package was found aimed at Ukrainian individuals in a widespread operation conducted by a Russian intelligence organization. Later, its deployment by a profit-driven cyber-attacker in China was observed.

The manner in which these instruments escaped or spread remains opaque. However, experts at Google’s security division issued a caution regarding a nascent trade in “previously owned” vulnerabilities, which are marketed to financially driven cyber-attackers seeking to maximize the utility of the exploit.

This revelation further illustrates how vulnerabilities and covert access points intended for state usage can escape, eventually being misused by digital criminals or other non-governmental entities. iVerify, a firm specializing in mobile device protection that acquired and deconstructed the intrusion utilities, stated in an online article that it connected the Coruna exploitation suite to the American administration, due to resemblances with cyber-attack instruments formerly ascribed to the U.S.

iVerify remarked, “As their deployment becomes more pervasive, the likelihood of a leak escalates.” The company added, “Though iVerify possesses indications suggesting this instrument is a compromised U.S. governmental apparatus, this fact should not eclipse the understanding that such utilities will ultimately become publicly accessible and will be exploited without scruples by malicious agents.”

Google affirmed the potency of these intrusion instruments, noting they can circumvent an iPhone’s safeguards merely by accessing a harmful web page harboring the exploitation script — for example, receiving a malevolent hyperlink — a method termed a “watering hole” infiltration. Per Google, the Coruna package is capable of breaching an iPhone through five distinct avenues, leveraging and linking 23 discrete weaknesses within its cyber weaponry. Impacted gadgets span from iPhone variants operating iOS 13 through 17.2.1, a version launched in December 2023.

Wired, the initial outlet to publicize this information, states that the Coruna package comprises elements formerly deployed in a cyber-attack operation designated Operation Triangulation. In 2023, the Russian cybersecurity corporation Kaspersky asserted that the American government attempted to compromise numerous iPhones owned by its personnel.

Techcrunch event

San Francisco, CA
|
October 13-15, 2026

Although disclosures of intrusion utilities are infrequent, they are not unprecedented. During 2017, America’s National Security Agency learned that instruments it had crafted for breaching Windows systems globally had been pilfered. The covert Windows access point, recognized as EternalBlue, was subsequently disclosed and employed by digital criminals in ensuing assaults, such as North Korea’s 2017 WannaCry ransomware offensive.

TechCrunch has also recently covered the situation involving Peter Williams, previously a leader at the American defense contractor L3Harris Trenchant. He received a penitentiary sentence exceeding seven years after admitting guilt for purloining and vending eight vulnerabilities to an intermediary reputedly collaborating with the Russian administration.

As per legal officials, Williams vended vulnerabilities able to infiltrate “millions of computational machines and gadgets” globally. A minimum of one such vulnerability was re-sold to a South Korean intermediary. It remains unknown whether these vulnerabilities were ever revealed to the software creators or subsequently mended.

{content}

Source: {feed_title}

Like this:

Like Loading...

Related

Cybercriminals Government hacking iPhones suite Targeting tools
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Admin
  • Website

Related Posts

SpaceX’s $119 Billion ‘Terafab’ Bet: Building a Chip Powerhouse in Texas

06/05/2026

Bring a Friend to Disrupt 2026 for Half Price! Offer Ends in 72 Hours

06/05/2026

SAP’s $1.16 Billion AI Bet: What NemoClaw Means for This Young German Lab

06/05/2026
Leave A Reply Cancel Reply

Don't Miss
Sports

Bayern Munich vs. PSG: UCL Semi-Final Showdown – Every Goal, Every Stat, Live!

By Admin06/05/20260

The stage is set, the Allianz Arena is buzzing, and the air crackles with anticipation!…

Like this:

Like Loading...

Air Force Unleashes Massive EA-37 Fleet Surge: Dominating the Electronic Battlefield

06/05/2026

SpaceX’s $119 Billion ‘Terafab’ Bet: Building a Chip Powerhouse in Texas

06/05/2026

Nottingham Forest: Gibbs-White’s Availability — Unraveling the ‘Big Question’

06/05/2026

Josh D’Amaro Unveils Disney’s AI & Content Master Plan for Future Growth

06/05/2026

Bring a Friend to Disrupt 2026 for Half Price! Offer Ends in 72 Hours

06/05/2026

Patria Forges Czech Defense Alliance for Landmark Armoured Vehicle Bid

06/05/2026

Citadel’s Miami Power Play: Ken Griffin Doubles Down, Stoking NYC Rivalry

06/05/2026

Arsenal’s UCL Final Destiny: Live Updates, Goals & All the Drama vs Atletico Madrid

06/05/2026

SAP’s $1.16 Billion AI Bet: What NemoClaw Means for This Young German Lab

06/05/2026
Advertisement
About Us
About Us

NewsTech24 is your premier digital news destination, delivering breaking updates, in-depth analysis, and real-time coverage across sports, technology, global economics, and the Arab world. We pride ourselves on accuracy, speed, and unbiased reporting, keeping you informed 24/7. Whether it’s the latest tech innovations, market trends, sports highlights, or key developments in the Middle East—NewsTech24 bridges the gap between news and insight.

Company
  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Disclaimer
  • Terms Of Use
Latest Posts

Bayern Munich vs. PSG: UCL Semi-Final Showdown – Every Goal, Every Stat, Live!

06/05/2026

Air Force Unleashes Massive EA-37 Fleet Surge: Dominating the Electronic Battlefield

06/05/2026

SpaceX’s $119 Billion ‘Terafab’ Bet: Building a Chip Powerhouse in Texas

06/05/2026

Nottingham Forest: Gibbs-White’s Availability — Unraveling the ‘Big Question’

06/05/2026

Josh D’Amaro Unveils Disney’s AI & Content Master Plan for Future Growth

06/05/2026
Newstech24.com
Facebook X (Twitter) Tumblr Threads RSS
  • Home
  • News
  • Technology
  • Economy & Business
  • Sports News
© 2026

Type above and press Enter to search. Press Esc to cancel.

Powered by
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by
%d