/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
Tech news intelligence API
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
TEXXR

Chronicles

The story behind the story

days · browse · Enter similar · o open

Google, iVerify, and Lookout researchers discover DarkSword, a hacking tool used by Russia-sponsored and other hackers to target iOS 18 via Ukrainian websites

A powerful iPhone-hacking technique known as DarkSword has been discovered in use by Russian hackers.

Wired Andy Greenberg

Discussion

  • @ryanaraine Ryan Naraine on x
    Two full iOS exploit kits in one month, deployed via watering holes on public websites, potentially affecting hundreds of millions of devices. Will Apple acknowledge that this no longer fits the “very small number of highly targeted individuals” narrative? [image]
  • @krzywix Mateusz Krzywicki on x
    In collaboration with Lookout and Google (thank you 🙏) we have been working on tearing down and building detections for DarkSword - iOS exploit chain for iOS 18.4 - 18.7. Super excited for this research 🎉. Please update your iPhones. https://iverify.io/...
  • @mattjay Matt Johansen on x
    I've been briefed on this one from the team that found it. I interviewed them yesterday and will put out a video soon. - it's an insane story between Darksword and Coruna.
  • @onejailbreak_ @onejailbreak_ on x
    🗞️DarkSword, a full-chain iOS exploit using 4 zero-days, has been used in real attacks across multiple countries🥷🚀 Targets iOS 18.4-18.7, while earlier Coruna chains hit iOS 13-17.2.1. https://onejailbreak.com/... This may be useful for a jailbreak, and more! — All via Safari [im…
  • @intcyberdigest @intcyberdigest on x
    ❗️GTIG has identified an exploit chain targeting Apple iOS users called DarkSword. Victims get compromised by visiting a website. It does: ▪️ Messages, contacts, call logs ▪️ Location, browser data ▪️ Crypto wallets, WiFi pass, keychains ▪️ Take screenshots, record audio [image]
  • @zeroxjf Johnny on x
    Wild couple weeks for the iOS jailbreak community. 2 exploit chains in 2 weeks. ICYMI, there's a new iOS 18 chain (details below). Payloads don't appear to be in the wild, (good given how many are still on iOS 18), but likely means no imminent ability to adapt for a jailbreak.
  • @_danielsinclair Daniel Sinclair on x
    Interestingly, we haven't seen these surveillance payloads scoop up your interactions with AI apps. Some day soon, surely, as ChatGPT knows more about you than any contact on your device.
  • @pirat_nation @pirat_nation on x
    A new iOS hacking tool called DarkSword targets iPhones running iOS 18.4 to 18.7. It uses several serious security holes to break out of Apple's protection, run harmful code, and install spyware. The spyware (named GHOSTBLADE and GHOSTKNIFE) steals cryptocurrency wallets, [image]
  • @a_greenberg Andy Greenberg on x
    This tool has already been used in distinct hacking campaigns against Ukrainians, Malaysians, Saudi and Turkish victims. If other hackers needed any more encouragement to adopt it, too, the Russian spies who used it left it fully unobfuscated with helpful code comments legible.
  • @p3b7_ Charles Guillemet on x
    Only days after Coruna, one of the first large-scale iOS exploit kits, DarkSword is already being exploited in the wild.  Coruna showed the pattern: state-grade iOS exploits don't stay in government hands.  They leak, spread, and end up in broader ecosystems.  One visit to a comp…
  • @agreenberg Andy Greenberg on bluesky
    This tool has already been used in distinct hacking campaigns against Ukrainians, Malaysians, Saudi and Turkish victims.  If other hackers needed any more encouragement to adopt it, too, the Russian spies who used it left it fully unobfuscated with even its developers' helpful co…
  • @couts Andrew Couts on bluesky
    NEW: iPhones running iOS 18—there are hundreds of millions of them—are potentially vulnerable to newly discovered hacking tools, capable of stealing troves of data, that were found in use in the wild.  Update to iOS 26 now to patch. @agreenberg.bsky.social reports: www.wired.com/…
  • @gregotto Greg Otto on bluesky
    NEW: Joint research from Google, iVerify and Lookout uncovers “Darksword,” *another* suspected exploit kit built using high-end iOS exploits likely originally developed by/for the U.S. government.  This is similar to Coruna, but has a much larger potential victim base cyberscoop.…
  • @fmarini@mastodon.social Francesco Marini on mastodon
    As usual, Wired is... not great 🙄  —  Regarding DarkSword, the latest objectively bad exploit affecting iOS and Safari, Google has a more in depth analysis, with a lot more informations on the specific versions of iOS that are affected. …
  • r/technology r on reddit
    Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild |  A powerful iPhone-hacking technique known as DarkSword has been discovered in use by Russian hackers. …
  • r/iPhone13Mini r on reddit
    Critical iOS 18 vulnerability found
  • r/cybersecurity r on reddit
    Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild
  • r/pwnhub r on reddit
    Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild
  • r/cybersecurity r on reddit
    Second iOS exploit kit emerges from suspected Russian hackers using possible U.S. government-developed tools