DIGITAL LIFE

Alert: DarkSword spyware for iPhone linked to Russia
The DarkSword spyware for iPhone has been identified by the Google Threat Intelligence Group (GTIG), Lookout, and iVerify as part of a cyber espionage arsenal allegedly operated by groups linked to the Russian government. The attacks primarily targeted Ukrainian targets, but intrusion logs also point to Saudi Arabia, Turkey, and Malaysia. Apple has issued an official alert and recommends the immediate update of all devices.
The GTIG (Google Threat Intelligence Group), in conjunction with Lookout and iVerify, published this week a detailed analysis of two exploit kits: DarkSword and Coruna. The first targets iPhones with iOS versions 18.4 to 18.6.2 and can extract passwords, photos, cryptocurrency wallet credentials, WhatsApp and Telegram messages, browsing history, and call logs, erasing its traces after the intrusion. The second is a package of 23 components, identified in early March 2026.
The persistent threat group UNC6353 is using both tools in watering hole attacks (a technique that involves compromising legitimate websites frequented by targets, such as news portals and government platforms). iVerify estimates that up to 270 million users may be exposed. Lookout adds that about 15% of all iOS devices in use continue to run vulnerable versions of the operating system.
According to TechCrunch, which reported the results of the forensic analysis conducted by the investigators, the Coruna toolkit was originally developed by the US company L3Harris, a US defense contractor. L3Harris has not publicly confirmed this attribution. The tool is believed to have reached the hands of Russian operatives and Chinese cybercriminals through a path that investigators have not yet been able to fully reconstruct.
Rocky Cole, co-founder of iVerify, told TechCrunch: “All indications point to the Russian government.” Investigator Justin Albrecht, from Lookout, describes UNC6353 as “a well-funded threat actor, conducting attacks for financial gain and espionage in alignment with the requirements of Russian intelligence services.” Both claims are based on behavioral and infrastructure analysis, with no official confirmation from any government.
One noteworthy detail is the use of large-scale language models in the customization of both toolkits. The DarkSword server component contained AI-generated code with detailed technical comments, a serious operational security flaw for an agent linked to a state. Some experts warn, however, of the possibility that this is a deliberate false flag technique, intended to make it difficult to attribute to a specific actor.
How to protect yourself:
-Update iOS Settings > General > Software Update
-Restart your device A simple restart eliminates malware residing in volatile memory
-Enable isolation mode settings > privacy & security > isolation mode
-Avoid unverified websites do not click on links from unknown sources
Apple stated that it is “aware of a report indicating that this issue may have been exploited in a highly sophisticated attack against specific individuals in iOS versions prior to iOS 26.” All vulnerabilities were fixed with the release of iOS 26.3 in February 2026; the iOS 26.3.1 version, released in March, introduced additional fixes. Google reported the flaws to Apple at the end of 2025.
For high-risk users (journalists, activists, government officials), Lockdown Mode remains the most robust protection available on iOS. The feature disables features such as connection previews and the installation of configuration profiles, so its use should be considered on a case-by-case basis.
This case exposes a structural flaw in the cybersecurity tools market: the absence of effective post-sale control mechanisms. A tool developed by a private American contractor reached agents of adversarial states without any containment mechanism working. The debate on the regulation of the cyberweapons market (already underway after the Pegasus case) takes on new dimensions with the evidence of the use of artificial intelligence to lower the technical barrier to entry in this type of operation.
The DarkSword spyware for iPhone targeted devices running iOS 18.4 to 18.6.2, capable of extracting sensitive data without leaving a trace.
The UNC6353 group, with alleged links to the Russian government, used watering hole attacks against Ukrainian targets, among other countries.
The Coruna toolkit was allegedly developed by the American defense contractor L3Harris, according to forensic code analysis (attribution not confirmed by the company).
Up to 270 million iPhone users may be exposed, with 15% of iOS devices still running vulnerable versions.
All flaws are fixed in iOS 26.3 and later versions.
mundophone







