Normal view
Apple Rolls Out DarkSword Exploit Protection to More Devices
The DarkSword exploit kit has been used by both state-sponsored hackers and commercial spyware vendors.
The post Apple Rolls Out DarkSword Exploit Protection to More Devices appeared first on SecurityWeek.
Russian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
The state-sponsored groupβs campaign has targeted government, higher education, financial, and legal entities, as well as think tanks.
The post Russian APT Star Blizzard Adopts DarkSword iOS Exploit Kit appeared first on SecurityWeek.
-
CyberScoop
- DarkSwordβs GitHub leak threatens to turn elite iPhone hacking into a tool for the masses
DarkSwordβs GitHub leak threatens to turn elite iPhone hacking into a tool for the masses
Leaked iOS spyware has some cybersecurity professionals raising urgent alarms about potential mass iPhone compromises, a development that pairs ominously with the recent discovery of two sophisticated iOS exploit kits.
At the same time, some other experts say Appleβs defensive features for iPhones remain elite. But several factors have created unprecedented circumstances: the public accessibility of a version of DarkSword, shortly after the discovery of the original version of DarkSword and the earlier discovery of a similar kit known asΒ Coruna, and aΒ growing market for iPhone exploits driven by their high value as targets.
Allan Liska, field chief information security officer at Recorded Future, said he was worried about what the leaked DarkSword version could do to βdemocratizeβ iPhone exploits.
βRight now, iPhone exploitations are among the most expensive to research/implement so they have been, largely, the realm of nation-states,β he said. βIf anyone can exploit an iPhone, suddenly something that has managed to be relatively secure now is a much bigger attack surface.β
Google, iVerify and Lookout released research last week on DarkSwordβs discovery, centered on Ukraine. Google also said it saw targeting in Saudi Arabia, Turkey and Malaysia. And that was before a version turned up on GitHub, a development TechCrunch first reported and Google and iVerify have analyzed. (The week before, iVerify and Google uncovered Coruna. Google declined to comment further for this story.)
βItβs extremely alarming that this leaked out on GitHub,β said Rocky Cole, co-founder of iVerify. βI would assume that itβs being used all around the world, and including here in the United States.β
Hundreds of millions of iPhones running iOS 18 could be vulnerable to DarkSword.
βI think that the top line issues here are pretty clear: people who have devices that are vulnerable should upgrade ASAP,β said Eva Galperin, director of cybersecurity at the Electronic Frontier Foundation. βIt is very likely that these vulnerabilities are being used right now to exploit vulnerable devices at scale, which is unusual for Apple products.β
The propagation problem
Coruna was concerning enough for Apple that it took the rare step of backporting security updates to still older versions of iOS, Cole said. The fear, he said, was that it might be wormable β capable of spreading from one device via text message to everyone in a phoneβs contact list.
But Cole said Apple hasnβt released similar security-focused updates to iOS 18, for reasons he doesnβt know.
Apple has emphasized the patches it has issued, urged users to update their phones and touted Lockdown Mode as a defense against spyware.
βApple devices are designed with multiple layers of security in order to protect against a wide range of potential threats, and every day Appleβs security teams around the world work tirelessly to protect usersβ devices and data,β said Apple spokesperson Sarah OβRourke. βKeeping your software up to date is the single most important thing you can do to maintain the security of your Apple products, and devices with updated software were not at risk from these reported attacks.β
IPhonesβ widespread use makes them high-value targets, fueling a thriving market for exploits. Coruna and DarkSword are indicators of this growing demand.Β
βItβs time for organizations to start thinking of mobile security the way they think about desktop security, which is to say everyone knows how to secure their laptop,β Cole said. And for iPhone exploit hunting in particular, βyouβre starting to see people do it at a mass level.β Furthermore, the resale market is such that exploits that once were exclusive are no longer, and AI makes it even easier to customize them in the code, he said.Β
DarkSword has drawn federal attention: The Cybersecurity and Infrastructure Security Agency this week added vulnerabilities that DarkSword exploits to the list that federal agencies must patch.
The number of people still using iOS 18 is large, up to 25% of all iPhones. Cole said several factors are contributing to that, such as users being leery of iOS 26βs onboard artificial intelligence or the Liquid Glass interface.
Said Galperin: βThere are many reasons why people do not keep their devices up to date, so when I tell people βjust patch your stuffβ I think it is important to realize that there are circumstances under which this is easier said than done.β
Proven defenses despite expanding risks
Despite the concerns, Cole credited iPhone for its high security standards, in particular for its app store.
For Natalia Krapiva, senior tech-legal counsel at Access Now, a key takeaway is the worrisome proliferation of commercial spyware and cyber intrusion capabilities.
βThis is exactly what human rights activists and digital security researchers have been warning governments and companies about: In the absence of effective regulation for the industry, these exploits will get out and end up in the hands of adversaries like Russia, China, Iran, or, as in the case of DarkSword, leaked online for any criminal to use,β she said.
On the other hand, Appleβs Lockdown Mode and Memory Integrity Enforcement are top-notch defensive measures, Krapiva said. Weβve yet to see a Lockdown Mode-enabled iPhone being infected with spyware, she said.
βI think weβll keep seeing more attempts to exploit both Apple and Android devices as they improve their software and hardware security,β she said. βItβs the old cat-and-mouse game.β
Adam Boynton, senior enterprise strategy manager at Jamf, said whatβs happened with Coruna and DarkSword is evidence of Appleβs success.
βWhatβs encouraging here is that Appleβs security model works,β he said. βCoruna skips devices running the latest iOS versions and avoids those with Lockdown Mode enabled entirely. Thatβs a strong validation of the defences Apple has built.
βDarkSword reinforces the same principle,β he continued. βWhere Coruna targeted older iOS versions, DarkSword demonstrates that even relatively current releases can be targeted by determined actors. Apple moved quickly to patch the vulnerabilities involved, and devices running the latest iOS are protected.β
The post DarkSwordβs GitHub leak threatens to turn elite iPhone hacking into a tool for the masses appeared first on CyberScoop.
Publisher features weβll lose β and Word alternatives
Second iOS exploit kit now in use by suspected Russian hackers
Researchers have discovered a second instance of suspected Russian hackers using iOS exploits, pointing to what they say are several foreboding trends.
iVerify, Lookout and Google collaborated on the research published Wednesday, a follow-up to earlier revelations about a similar exploit kit, Coruna. While the second kit β dubbed DarkSword β also targeted users in Ukraine, the scale is significant: iVerify estimated up to 270 million iPhone users could be susceptible, while Lookout told CyberScoop roughly 15% of all iOS devices currently in use are running iOS 18 or earlier versions and could be vulnerable to the exploit kit.
The research reveals a range of new details, as well as interesting patterns:
- Whereas Russian and Chinese hackers used Coruna with financial gain in mind, there are signs DarkSword could serve both financial and surveillance purposes, and/or could be used to inflict harm.
- Lookout observed that someone used a large language model to customize both Coruna and DarkSword.
- The discovery of DarkSword reinforces earlier concerns about a secondary exploit market, Lookout and iVerify said.
- DarkSword is the second βmassβ iOS campaign discovered this month, with the first known one to be Coruna.
- Both kits suggest cyberattacks are migrating toward mobile phones as they make up a bigger portion of internet traffic, Rocky Cole, iVerifyβs co-founder and chief operating officer, told CyberScoop.
- Google also found that DarkSword was used against targets in Saudi Arabia, Turkey, and Malaysia
DarkSword can exfiltrate saved passwords, crypto wallets, text messages and more, researchers found. Attackers are leveraging the exploit kit by first compromising Appleβs WebKit and then using WebGPU as a pivot point for sandbox escapes, according to Justin Albrecht, Lookoutβs global director for mobile threat intelligence.
Whatβs less clear is who, exactly, is behind the exploit kit, other than the links to Russia. Cole said DarkSword is hosted on the same command and control infrastructure as Coruna, but is an entirely separate kit made by entirely separate people. Google has attributed the campaigns to a group it tracks as UNC6353, which it describes as a Russian-backed espionage group, as well as UNC6748 andΒ Turkish commercial surveillance vendor PARS Defense.Β
The attackersβ motives are also a bit opaque, mixing what appears to be both espionage and financial objectives. Albrecht noted there is precedent for this: Russian threat groups have targeted cryptocurrency in Ukraine before, notably with Infamous Chisel, an Android exploit kit deployed by Sandworm.Β
βTheyβre probably well-funded, probably well-connected, but itβs confirmed that theyβre stealing crypto. There is definitely a financial motivation,β Albrecht told CyberScoop. βNow, I think the big question is, depending on who the group is, is the financial motivation in this just to do damage to Ukrainians, or is it to steal crypto?β
Russia has been under heavy sanctions for a long time and is starting to have budget problems due to the ongoing war in Ukraine, he noted. βWhy not start to fund their operations with stolen funds? It wouldnβt be outside the norm, although it would be a potential shift in their TTPs for Russian APTs in general,β Albrecht said.Β
The kit could be handy for someone trying to do a βpattern of lifeβ analysis, Cole said, and thus useful for surveillance and intelligence purposes.
He said a commercial spyware vendor might have made the kit with no target audience in mind, thus the βSwiss Army knifeβ-like quality of it. The major concern for Cole is that thereβs apparently a growing market for these kinds of tools, and people may be lulled into a false sense of security about iPhones not being vulnerable.
Despite the sophistication of the exploits themselves, the threat actors behind DarkSword may not be particularly experienced, Albrecht said. None of the JavaScript or HTML code was obfuscated in any way, and the server-side component was labeled βDark sword file receiverβ β poor operational security for a seasoned Russian threat actor.
βYour experienced Russian threat actors, your APT29βs of the world, I would expect them to have better OPSEC,β Albrecht said.
One of the more unusual findings in the research is the clear presence of large language model-generated code. The server-side component of DarkSword, for instance, includes telltale signs of AI-generated code, complete with detailed notes and comments characteristic of LLM output.Β Itβs a development that effectively lowers the barrier to entry for deploying advanced mobile exploits, even among state-sponsored actors, Albrecht said.
All three research teams have been in contact with Apple about the findings, according to Albrecht, with Google likely in closest contact since they began investigating the threat in late 2025.Β In its blog, Google said it reported the vulnerabilities used in DarkSword to Apple in late 2025, and all vulnerabilities were patched with the release of iOS 26.3, although most were patched prior.
CLARIFICATION 3/18/26: Clarified the suspected origins of the DarkSword exploit kit and any links to tools developed for the U.S. government.
The post Second iOS exploit kit now in use by suspected Russian hackers appeared first on CyberScoop.
Patch Tuesday, February 2026 Edition
Microsoft today released updates to fix more than 50 security holes in its Windows operating systems and other software, including patches for a whopping six βzero-dayβ vulnerabilities that attackers are already exploiting in the wild.
![]()
Zero-day #1 this month is CVE-2026-21510, a security feature bypass vulnerability in Windows Shell wherein a single click on a malicious link can quietly bypass Windows protections and run attacker-controlled content without warning or consent dialogs. CVE-2026-21510 affects all currently supported versions of Windows.
The zero-day flawΒ CVE-2026-21513 is aΒ security bypass bug targeting MSHTML, the proprietary engine of the default Web browser in Windows. CVE-2026-21514 is a related security feature bypass in Microsoft Word.
The zero-day CVE-2026-21533 allows local attackers to elevate their user privileges to βSYSTEMβ level access in Windows Remote Desktop Services. CVE-2026-21519 is a zero-day elevation of privilege flaw in the Desktop Window Manager (DWM), a key component of Windows that organizes windows on a userβs screen. Microsoft fixed a different zero-day in DWM just last month.
The sixth zero-day is CVE-2026-21525, a potentially disruptive denial-of-service vulnerability in the Windows Remote Access Connection Manager, the service responsible for maintaining VPN connections to corporate networks.
Chris Goettl at Ivanti reminds us Microsoft has issued several out-of-band security updates since Januaryβs Patch Tuesday. On January 17, Microsoft pushed a fix that resolved a credential prompt failure when attempting remote desktop or remote application connections. On January 26, Microsoft patched a zero-day security feature bypass vulnerability (CVE-2026-21509) in Microsoft Office.
Kev Breen at Immersive notes that this monthβs Patch Tuesday includes several fixes for remote code execution vulnerabilities affecting GitHub Copilot and multiple integrated development environments (IDEs), including VS Code, Visual Studio, and JetBrains products. The relevant CVEs are CVE-2026-21516, CVE-2026-21523, and CVE-2026-21256.
Breen said the AI vulnerabilities Microsoft patched this month stem from a command injection flaw that can be triggered through prompt injection, or tricking the AI agent into doing something it shouldnβt β like executing malicious code or commands.
βDevelopers are high-value targets for threat actors, as they often have access to sensitive data such as API keys and secrets that function as keys to critical infrastructure, including privileged AWS or Azure API keys,β Breen said. βWhen organizations enable developers and automation pipelines to use LLMs and agentic AI, a malicious prompt can have significant impact. This does not mean organizations should stop using AI. It does mean developers should understand the risks, teams should clearly identify which systems and workflows have access to AI agents, and least-privilege principles should be applied to limit the blast radius if developer secrets are compromised.β
TheΒ SANS Internet Storm CenterΒ has aΒ clickable breakdown of each individual fix this month from Microsoft, indexed by severity and CVSS score. Enterprise Windows admins involved in testing patches before rolling them out should keep an eye on askwoody.com, which often has the skinny on wonky updates. Please donβt neglect to back up your data if it has been a while since youβve done that, and feel free to sound off in the comments if you experience problems installing any of these fixes.
Image positioning in Word
Copilot and AI for skeptics
How to transfer Microsoft 365 Office files and settings to a new PC
The state of Microsoft 365
What to do about Microsoft Publisher
Making certificates in Word or PowerPoint
Having Fun with ActiveX Controls in Microsoft Word
![]()
Marcello Salvati// During Red Team and penetration tests, itβs always important and valuable to test assumptions. One major assumption I hear from Pentesters, Red teamers and clients alike is that [β¦]
The post Having Fun with ActiveX Controls in Microsoft Word appeared first on Black Hills Information Security, Inc..
Running HashCat on Ubuntu 18.04 Server with 1080TI
![]()
Derrick Rauch and Kent Ickler // (Updated 3/22/2019) First, to see what our build looks like, look here:Β https://www.blackhillsinfosec.com/build-password-cracker-nvidia-gtx-1080ti-gtx-1070/ Whatβs next?Β Time for System Rebuild! First, you need to decide whether you [β¦]
The post Running HashCat on Ubuntu 18.04 Server with 1080TI appeared first on Black Hills Information Security, Inc..
Finding: Weak Password Policy
![]()
David Fletcher// The weak password policy finding is typically an indicator of one of two conditions during a test: A password could be easily guessed using standard authentication mechanisms. A [β¦]
The post Finding: Weak Password Policy appeared first on Black Hills Information Security, Inc..
Hide Payload in MS Office Document Properties
![]()
Carrie Roberts* // Can you think of a reason why you might want to put a lengthy comment into the properties of an MS Office document? If you can, then [β¦]
The post Hide Payload in MS Office Document Properties appeared first on Black Hills Information Security, Inc..
How to Crack Passwords for Password Protected MS Office Documents
![]()
Carrie Roberts*Β // (Updated, 2/11/2019) Trying to figure out the password for a password protected MS Office document? This free solution might do the trick. It attempts to guess the password [β¦]
The post How to Crack Passwords for Password Protected MS Office Documents appeared first on Black Hills Information Security, Inc..
How to Build a Password Cracker with NVidia GTX 1080TI & GTX 1070
![]()
Kent Ickler // The Task Buy The Things: Total for new password cracking machine$5110 A Few Quick Lessons The CPU cooler doesnβt actually clear the case cover. This was OK [β¦]
The post How to Build a Password Cracker with NVidia GTX 1080TI & GTX 1070 appeared first on Black Hills Information Security, Inc..
How to Get Malicious Macros Past Email Filters
![]()
Carrie Roberts // Β Β Β A malicious macro in a Microsoft Word or Excel document is an effective hacking technique. These documents could be delivered in a variety of [β¦]
The post How to Get Malicious Macros Past Email Filters appeared first on Black Hills Information Security, Inc..