Close Menu
Newstech24.com
  • Home
  • News
  • Arabic News
  • Technology
  • Economy & Business
  • Sports News
What's Hot

Alysa Liu: Olympic Champion Unlocks Oakland’s Heart

13/03/2026

Calvin Austin III Goes Big Blue: Steelers WR Jumps to Giants

12/03/2026

Geno Smith’s Bold Verdict: New Jet Outclasses the Departed

12/03/2026
Facebook X (Twitter) Instagram
Friday, March 13
Facebook X (Twitter) Instagram
Newstech24.com
  • Home
  • News
  • Arabic News
  • Technology
  • Economy & Business
  • Sports News
Newstech24.com
Home»Technology»Government’s iPhone Attack Kit Weaponized by Cybercriminals
Technology

Government’s iPhone Attack Kit Weaponized by Cybercriminals

By Admin03/03/2026Updated:11/03/2026No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
A suite of government hacking tools targeting iPhones is now being used by cybercriminals
Share
Facebook Twitter LinkedIn Pinterest Email

Cybersecurity investigators have uncovered a collection of potent intrusion instruments, reportedly capable of breaching Apple iPhones running outmoded software. These tools, they contend, have transitioned from a state client into the hands of malicious digital actors.

On Tuesday, Google disclosed that it initially detected the exploitation suite, known as Coruna, in February 2025. This occurred during a monitoring provider’s effort to infiltrate a mobile device with malicious software at the behest of a governmental agency. Months subsequent, the identical exploit package was found aimed at Ukrainian individuals in a widespread operation conducted by a Russian intelligence organization. Later, its deployment by a profit-driven cyber-attacker in China was observed.

The manner in which these instruments escaped or spread remains opaque. However, experts at Google’s security division issued a caution regarding a nascent trade in “previously owned” vulnerabilities, which are marketed to financially driven cyber-attackers seeking to maximize the utility of the exploit.

This revelation further illustrates how vulnerabilities and covert access points intended for state usage can escape, eventually being misused by digital criminals or other non-governmental entities. iVerify, a firm specializing in mobile device protection that acquired and deconstructed the intrusion utilities, stated in an online article that it connected the Coruna exploitation suite to the American administration, due to resemblances with cyber-attack instruments formerly ascribed to the U.S.

iVerify remarked, “As their deployment becomes more pervasive, the likelihood of a leak escalates.” The company added, “Though iVerify possesses indications suggesting this instrument is a compromised U.S. governmental apparatus, this fact should not eclipse the understanding that such utilities will ultimately become publicly accessible and will be exploited without scruples by malicious agents.”

Google affirmed the potency of these intrusion instruments, noting they can circumvent an iPhone’s safeguards merely by accessing a harmful web page harboring the exploitation script — for example, receiving a malevolent hyperlink — a method termed a “watering hole” infiltration. Per Google, the Coruna package is capable of breaching an iPhone through five distinct avenues, leveraging and linking 23 discrete weaknesses within its cyber weaponry. Impacted gadgets span from iPhone variants operating iOS 13 through 17.2.1, a version launched in December 2023.

Wired, the initial outlet to publicize this information, states that the Coruna package comprises elements formerly deployed in a cyber-attack operation designated Operation Triangulation. In 2023, the Russian cybersecurity corporation Kaspersky asserted that the American government attempted to compromise numerous iPhones owned by its personnel.

Techcrunch event

San Francisco, CA
|
October 13-15, 2026

Although disclosures of intrusion utilities are infrequent, they are not unprecedented. During 2017, America’s National Security Agency learned that instruments it had crafted for breaching Windows systems globally had been pilfered. The covert Windows access point, recognized as EternalBlue, was subsequently disclosed and employed by digital criminals in ensuing assaults, such as North Korea’s 2017 WannaCry ransomware offensive.

TechCrunch has also recently covered the situation involving Peter Williams, previously a leader at the American defense contractor L3Harris Trenchant. He received a penitentiary sentence exceeding seven years after admitting guilt for purloining and vending eight vulnerabilities to an intermediary reputedly collaborating with the Russian administration.

As per legal officials, Williams vended vulnerabilities able to infiltrate “millions of computational machines and gadgets” globally. A minimum of one such vulnerability was re-sold to a South Korean intermediary. It remains unknown whether these vulnerabilities were ever revealed to the software creators or subsequently mended.

{content}

Source: {feed_title}

Like this:

Like Loading...

Related

Cybercriminals Government hacking iPhones suite Targeting tools
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Admin
  • Website

Related Posts

Facebook Marketplace AI: The End of “Is This Still Available?” Spam

12/03/2026

Grammarly Sued: Authors Allege Forced AI Editing

12/03/2026

Webflow’s Marketing Brain: Acquires AI Content Creator Vidoso

12/03/2026
Leave A Reply Cancel Reply

Don't Miss
Sports

Alysa Liu: Olympic Champion Unlocks Oakland’s Heart

By Admin13/03/20260

A gathering to honor ice-skating victor Alysa Liu, the Olympic Games champion, took place in…

Like this:

Like Loading...

Calvin Austin III Goes Big Blue: Steelers WR Jumps to Giants

12/03/2026

Geno Smith’s Bold Verdict: New Jet Outclasses the Departed

12/03/2026

Unlock a World of Exclusive Reads

12/03/2026

Greenlaw’s Golden Gate Homecoming

12/03/2026

B-1 Lancer Blitz: UK Base Sees Unprecedented Bomber Buildup

12/03/2026

Facebook Marketplace AI: The End of “Is This Still Available?” Spam

12/03/2026

Grammarly Sued: Authors Allege Forced AI Editing

12/03/2026

Webflow’s Marketing Brain: Acquires AI Content Creator Vidoso

12/03/2026

6.11%: Mortgage Rates Redraw the Housing Landscape

12/03/2026
Advertisement
About Us
About Us

NewsTech24 is your premier digital news destination, delivering breaking updates, in-depth analysis, and real-time coverage across sports, technology, global economics, and the Arab world. We pride ourselves on accuracy, speed, and unbiased reporting, keeping you informed 24/7. Whether it’s the latest tech innovations, market trends, sports highlights, or key developments in the Middle East—NewsTech24 bridges the gap between news and insight.

Company
  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Disclaimer
  • Terms Of Use
Latest Posts

Alysa Liu: Olympic Champion Unlocks Oakland’s Heart

13/03/2026

Calvin Austin III Goes Big Blue: Steelers WR Jumps to Giants

12/03/2026

Geno Smith’s Bold Verdict: New Jet Outclasses the Departed

12/03/2026

Unlock a World of Exclusive Reads

12/03/2026

Greenlaw’s Golden Gate Homecoming

12/03/2026
Newstech24.com
Facebook X (Twitter) Tumblr Threads RSS
  • Home
  • News
  • Arabic News
  • Technology
  • Economy & Business
  • Sports News
© 2026 ThemeSphere. Designed by ThemeSphere.

Type above and press Enter to search. Press Esc to cancel.

Powered by
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by
%d