Google and iVerify reveal Coruna, a sophisticated exploit kit that chains 23 vulnerabilities to target older iPhones, now being used by cybercriminals after allegedly leaking from government sources.
Google's Threat Intelligence Group and mobile security company iVerify have uncovered a sophisticated exploit kit called Coruna that's raising serious concerns in the cybersecurity community. This government-grade iPhone exploit kit, which chains multiple vulnerabilities to target older iOS devices, has reportedly leaked from its original creators and is now being deployed by criminal groups.
How Coruna Works
At its core, Coruna is an advanced exploit framework that leverages five distinct iOS exploit chains and 23 separate vulnerabilities to compromise iPhones running iOS 13 through iOS 17.2.1. The attack begins when a victim visits a malicious website containing hidden JavaScript that performs reconnaissance on the device, checking the model, system version, and various security settings.
What makes Coruna particularly sophisticated is its multi-layered approach to bypassing iOS security. The exploit progressively breaches the iPhone's security layers, working its way from initial access to gaining high-level system privileges. Once inside, it can install malware capable of collecting sensitive data or downloading additional malicious modules.
Interestingly, the exploit includes built-in detection for iOS security features. It specifically checks whether Lockdown Mode is enabled on the device and will abort the attack if it detects this enhanced security setting. The exploit also avoids targeting users in private browsing mode, suggesting its operators are attempting to minimize detection and maximize success rates.
Government Origins, Criminal Deployment
The most concerning aspect of Coruna is its apparent lineage. According to iVerify's analysis, the exploit kit appears to have been built on the same foundations as known US government hacking tools. This represents a troubling pattern in the cybersecurity landscape where sophisticated government-developed tools eventually leak and fall into the hands of criminal actors.
From iVerify's report: "This is the first observed mass exploitation of mobile phones, including iOS, by a criminal group using tools likely built by a nation-state."
Despite these apparent shared roots with US-government-linked tools, Coruna has been deployed in campaigns by Russian intelligence operatives and China-based cybercriminals. This shift from targeted government surveillance to mass criminal exploitation highlights the dangerous lifecycle of advanced hacking tools once they escape controlled environments.
Real-World Impact and Delivery Methods
The exploit kit has been delivered through "watering hole" attacks, where legitimate websites are compromised to serve malicious content to visitors. In observed campaigns, attackers used fake cryptocurrency services as bait, luring victims to malicious pages designed to trigger the Coruna exploit chain.
The financial motivation behind these attacks is clear from the final payloads. Once a device is compromised, the malware modules are specifically designed to extract cryptocurrency wallet data and recovery phrases, targeting the growing wealth stored in digital assets.
Protection and Prevention
For iPhone users, the primary defense against Coruna and similar exploits is straightforward: keep your device updated to the latest iOS version. The exploit kit specifically targets older iOS versions and is ineffective against the latest system releases. This underscores why timely software updates remain one of the most critical security practices.
Additionally, users should be cautious when visiting unfamiliar websites, especially those related to cryptocurrency or financial services. The watering hole attack vector means that even legitimate-seeming sites can become compromised and serve malicious content.
The Broader Implications
This incident represents a significant escalation in the mobile threat landscape. The migration of government-grade exploit tools to criminal hands demonstrates how the proliferation of advanced hacking capabilities is lowering the barrier for sophisticated attacks. What was once the domain of nation-states with substantial resources is now accessible to organized criminal groups.
The targeting of cryptocurrency wallets also reflects the evolving nature of cybercrime, where traditional financial theft has given way to digital asset extraction. As more wealth moves into cryptocurrency, mobile devices have become increasingly attractive targets for attackers seeking direct access to these assets.
For the cybersecurity industry, Coruna serves as a stark reminder of the importance of responsible vulnerability disclosure and the need for robust security measures at every layer of the technology stack. The fact that 23 vulnerabilities were chained together to create this exploit kit highlights how even individual security flaws, when combined, can create devastating attack capabilities.
The leak and subsequent criminal use of Coruna also raises questions about the security practices surrounding government hacking tools and the long-term consequences of developing and stockpiling such capabilities. As these tools inevitably leak, they create a persistent threat that can be repurposed by increasingly sophisticated criminal organizations.
For iPhone users running current iOS versions, the immediate threat from Coruna is minimal. However, the broader trend it represents—the democratization of advanced exploit capabilities—suggests that mobile security will only become more critical in the years ahead. The incident serves as both a warning about the evolving threat landscape and a reminder of the fundamental security practices that remain our best defense.

Comments
Please log in or register to join the discussion