Cybersecurity Alert Google Uncovers "Coruna" Malware Targeting Millions of Older iPhone.
The "Coruna" Breach: How a U.S. State-Grade Spyware Fell into the Hands of Crypto-Thieves
A chilling report from the Google Threat Intelligence Group and cybersecurity firm iVerify has uncovered a highly sophisticated iPhone hacking toolkit. Known as "Coruna" this professional-grade software is believed to have originated within the U.S. government for high-level espionage, but it has now "leaked" into the wild, fueling a massive wave of digital asset theft by organized cybercrime groups.
Technical Sophistication: 23 Zero-Day Exploits
Coruna is not your average malware; it is a "state-grade" weapon packed with 23 distinct exploits. Researchers found that the toolkit can compromise iPhones running iOS 13 through iOS 17.2.1.
The Attack Vector: Hackers utilize malicious websites (primarily in Chinese) to distribute the malware.
Seamless Infection: A simple visit to an infected page triggers an automated system check. If the device is vulnerable, the exploit code is immediately injected and embedded into the system without any user interaction or notification.
The Dark Timeline: From Intelligence Agencies to Cyber-Gangs
The journey of Coruna highlights the terrifying volatility of cyber weapons:
Origin: Believed to be crafted by U.S. national security agencies for clandestine missions.
First Leak: Evidence suggests the toolkit was first intercepted and utilized by Russian intelligence to target strategic assets in Ukraine.
Current State: The tools have now been commodified on the dark web, utilized by Cybercrime Organizations specifically to breach iPhone wallets and steal cryptocurrency.
A Shift in Strategy: From Precision to Mass Attacks
Unlike previous high-profile spyware like Pegasus, which was used for surgical strikes against specific individuals (journalists or activists), Coruna marks a dangerous shift toward "Mass Attacks." This is the first time state-level technology has been used in a broad, "spray-and-pray" campaign against the general public. While Apple has patched these vulnerabilities in recent updates (up to iOS 26), users on older hardware or those who neglect software updates remain easy prey.
The Coruna case is a prime example of cyber blowback, meaning that cyber weapons created by a government to attack enemies are seized by those enemies or criminals and used to attack citizens of the country that created them (or their allies). It's like having a gun stolen from a state arsenal.
Worryingly, older iPhone models that Apple has stopped supporting (end-of-life), such as the iPhone 8 or iPhone X, cannot be updated to secure iOS versions. This makes these devices "permanent targets" for Coruna malware in the second-hand market or in developing countries.
By 2026, attacks on crypto wallets are more cost-effective and harder to trace than traditional ransomware. State-level malware like Coruna can bypass Two-Factor Authentication (2FA) on devices, allowing for instantaneous transfers of funds from wallets.
Human rights activists warn that when these tools become a "wide-ranging" attack, they will undermine trust in the entire digital economy, not just privacy but also the financial security of ordinary citizens.
Google and Samsung Team Up Android 16 Officially Transforms Your Phone into a Desktop.
Source: TechCrunch

Comments
Post a Comment