Close Menu

    Subscribe to Updates

    Get the latest tech news from Tallwire.

      What's Hot

      Leaked Government-Grade iPhone Hacking Tools Now Power Global Cybercrime Campaign

      March 6, 2026

      Floating Data Centers Could Beat Costly Space-Based AI Infrastructure

      March 6, 2026

      TikTok Rejects End-To-End Encryption For Direct Messages, Raising Privacy Concerns

      March 6, 2026
      Facebook X (Twitter) Instagram
      • Tech
      • AI
      • Get In Touch
      Facebook X (Twitter) LinkedIn
      TallwireTallwire
      • Tech

        Floating Data Centers Could Beat Costly Space-Based AI Infrastructure

        March 6, 2026

        TikTok Rejects End-To-End Encryption For Direct Messages, Raising Privacy Concerns

        March 6, 2026

        CERN Turns To Artificial Intelligence To Challenge Long-Standing Physics Theories

        March 6, 2026

        Tech Leaders Warn Washington Tax Push Could Cripple AI Innovation

        March 5, 2026

        Hackers And Internet Blackouts Rock Iran As Airstrikes Escalate

        March 5, 2026
      • AI

        Floating Data Centers Could Beat Costly Space-Based AI Infrastructure

        March 6, 2026

        CERN Turns To Artificial Intelligence To Challenge Long-Standing Physics Theories

        March 6, 2026

        Anthropic Says It Has Not Been Formally Notified Of Blacklisting By Pentagon

        March 6, 2026

        Apple Music Moves To Label AI-Generated Songs With New Transparency Tags

        March 6, 2026

        Data Centers Become Collateral Damage in Escalating Iran War

        March 6, 2026
      • Security

        Leaked Government-Grade iPhone Hacking Tools Now Power Global Cybercrime Campaign

        March 6, 2026

        International Crackdown Shutters Global Cybercrime Hub LeakBase

        March 6, 2026

        Discord Age Verification Push Sparks Search For Privacy-Focused Alternatives

        March 5, 2026

        Hacktivists Claim Breach Of Homeland Security Systems, Release ICE Contractor Data

        March 5, 2026

        Apple Security Needs Your Spam Reports To Strengthen Defenses

        March 4, 2026
      • Health

        Courtroom Scrutiny Grows Over Claims Instagram Tracked Usage While Pursuing Teens

        March 5, 2026

        Smartphone Use Creates A Daily “Vicious Cycle” Of Disconnection And Disengagement

        March 4, 2026

        Gaming Platforms Like Roblox Used by Crime Gangs to Groom Children, Victoria Warns

        March 4, 2026

        New AI-Generated Videos Ignite Debate Over Realism and Risks

        March 4, 2026

        Landmark Trial Puts Social Media Giants on the Defensive Over Youth Addiction Claims

        March 3, 2026
      • Science

        Floating Data Centers Could Beat Costly Space-Based AI Infrastructure

        March 6, 2026

        CERN Turns To Artificial Intelligence To Challenge Long-Standing Physics Theories

        March 6, 2026

        Astronomers Confirm Discovery Of Galaxy Nearly Entirely Composed Of Dark Matter

        March 1, 2026

        Microsoft Claims 100 Percent Renewable Energy Match Across Global Electricity Use

        February 28, 2026

        Taara Beam Launch Brings 25Gbps Optical Wireless Networks to Cities

        February 27, 2026
      • Tech

        Sam Altman Says ‘AI Washing’ Is Being Used to Mask Corporate Layoffs

        February 28, 2026

        Zuckerberg Testifies In Landmark Trial Over Alleged Teen Social Media Harms

        February 23, 2026

        Gay Tech Networks Under Spotlight In Silicon Valley Culture Debate

        February 23, 2026

        Google Co-Founder’s Epstein Contacts Reignite Scrutiny of Elite Tech Circles

        February 7, 2026

        Bill Gates Denies “Absolutely Absurd” Claims in Newly Released Epstein Files

        February 6, 2026
      TallwireTallwire
      Home»Cybersecurity»Leaked Government-Grade iPhone Hacking Tools Now Power Global Cybercrime Campaign
      Cybersecurity

      Leaked Government-Grade iPhone Hacking Tools Now Power Global Cybercrime Campaign

      5 Mins Read
      Facebook Twitter Pinterest LinkedIn Tumblr Email
      Hackers Masquerade Malware as ChatGPT, Office, Google Drive to Trick Workers
      Hackers Masquerade Malware as ChatGPT, Office, Google Drive to Trick Workers
      Share
      Facebook Twitter LinkedIn Pinterest Email

      Security researchers have discovered that a sophisticated suite of iPhone hacking tools originally designed for government surveillance operations has escaped into the wild and is now being actively used by cybercriminal groups across multiple countries. The exploit kit, known as “Coruna,” was first identified in 2025 during an attempted government-linked spyware operation but has since appeared in attacks attributed to Russian espionage groups and financially motivated hackers in China. Investigators say the toolkit uses chains of vulnerabilities—more than twenty separate flaws in some cases—to bypass Apple‘s security defenses, often through so-called “watering hole” attacks in which a victim’s phone is compromised simply by visiting a malicious website. Analysts believe the technology likely originated within a U.S. government-associated framework before proliferating through espionage networks and eventually reaching criminal markets. Security experts warn that the episode highlights a recurring pattern: powerful cyber weapons developed by governments often leak or are repurposed, ultimately turning into tools for mass cybercrime against ordinary users, businesses, and political targets. The situation echoes past incidents such as the infamous EternalBlue exploit, demonstrating once again that once digital weapons escape controlled environments, they rarely remain confined to their intended operators.

      Sources

      https://www.nextgov.com/cybersecurity/2026/03/potential-us-built-hacking-tools-obtained-foreign-spies-and-cybercriminals-research-says
      https://www.scworld.com/brief/coruna-exploit-kit-government-hacking-tools-surface-in-cybercriminal-hands

      Key Takeaways

      • Government-developed cyber tools can leak or be repurposed, eventually spreading into criminal markets and dramatically expanding their impact.
      • The Coruna exploit kit chains together dozens of iPhone vulnerabilities, allowing attackers to compromise devices through malicious websites and potentially steal sensitive financial or personal data.
      • The situation resembles past cyberweapon leaks, reinforcing concerns that digital espionage capabilities often migrate from state actors to criminal networks over time.

      In-Depth

      The discovery of the Coruna exploit kit represents the latest reminder that in the digital age, government cyber capabilities rarely remain confined to their intended mission. According to multiple cybersecurity research groups, the toolkit was originally observed in 2025 during a surveillance operation linked to a government customer of a spyware vendor. Over the following months, investigators began to notice the same code appearing in very different contexts—first in a suspected Russian intelligence campaign targeting individuals in Ukraine and later in financially motivated attacks originating from Chinese cybercriminal infrastructure.

      At its core, Coruna is a complex exploit framework designed to break into Apple’s iPhone ecosystem. Unlike the simplistic malware typically associated with consumer scams, this toolkit strings together dozens of vulnerabilities in Apple’s mobile operating system. In some cases, researchers say it relies on more than twenty individual flaws to bypass security protections. The result is an attack chain capable of silently installing spyware on a device if a victim merely visits a compromised webpage or clicks a malicious link embedded in a message.

      What makes the situation particularly troubling is the apparent origin of the technology. Security analysts who reverse-engineered the code say it bears strong similarities to previously identified government-grade cyber frameworks, leading some experts to believe the exploit kit may have originated from a U.S. government development environment or contractor network. While officials have not publicly confirmed the attribution, researchers note the code’s sophistication and structure resemble tools associated with Western intelligence agencies.

      Once these types of tools leave controlled environments, they often follow a predictable path. Initially developed for intelligence gathering or national security investigations, they are shared among government partners or contractors. From there, leaks, theft, or resale can push them into broader circulation among espionage groups and eventually into criminal marketplaces. In the case of Coruna, investigators believe that the technology may have been sold or redistributed through a shadowy secondary market for so-called “zero-day” exploits—previously unknown software vulnerabilities that can command enormous prices among hackers.

      The pattern has precedent. Nearly a decade ago, a collection of hacking tools developed by the National Security Agency leaked online and was later used in global ransomware attacks such as WannaCry and NotPetya. Those incidents caused billions of dollars in economic damage and demonstrated how rapidly sophisticated cyberweapons can move from government arsenals to the broader criminal ecosystem.

      Researchers warn that the Coruna toolkit could represent a similar turning point for mobile security. Although Apple has patched many of the vulnerabilities used in the exploit chain, older devices and phones running outdated versions of iOS remain vulnerable. In some campaigns already observed by analysts, the malware deployed through Coruna has been designed to harvest financial credentials and cryptocurrency wallet information—an indication that organized cybercriminal groups are adapting the technology for profit rather than espionage.

      For policymakers and technology companies alike, the episode raises uncomfortable questions about the long-term consequences of developing offensive cyber capabilities. Governments often argue that such tools are necessary for intelligence and law-enforcement operations, yet history shows that digital weapons are uniquely difficult to contain. Once code is copied, leaked, or sold, it can propagate indefinitely across networks and borders.

      From a broader perspective, the Coruna incident underscores the growing convergence between state-level cyberwarfare and everyday cybercrime. Techniques once reserved for intelligence agencies are increasingly appearing in criminal operations targeting ordinary users, businesses, and financial systems. In an era where smartphones serve as digital vaults for personal and financial data, that convergence represents a significant security challenge—and one that is unlikely to disappear anytime soon.

      Apple Intel iPhone Ransomware
      Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
      Previous ArticleFloating Data Centers Could Beat Costly Space-Based AI Infrastructure

      Related Posts

      Floating Data Centers Could Beat Costly Space-Based AI Infrastructure

      March 6, 2026

      International Crackdown Shutters Global Cybercrime Hub LeakBase

      March 6, 2026

      TikTok Rejects End-To-End Encryption For Direct Messages, Raising Privacy Concerns

      March 6, 2026

      Apple Music Moves To Label AI-Generated Songs With New Transparency Tags

      March 6, 2026
      Add A Comment
      Leave A Reply Cancel Reply

      Editors Picks

      Floating Data Centers Could Beat Costly Space-Based AI Infrastructure

      March 6, 2026

      TikTok Rejects End-To-End Encryption For Direct Messages, Raising Privacy Concerns

      March 6, 2026

      CERN Turns To Artificial Intelligence To Challenge Long-Standing Physics Theories

      March 6, 2026

      Tech Leaders Warn Washington Tax Push Could Cripple AI Innovation

      March 5, 2026
      Popular Topics
      Qualcomm Sundar Pichai Series A Series B Taiwan Tech Startup trending Ransomware Satya Nadella Tesla Cybertruck Tim Cook Quantum computing Robotics spotlight Sam Altman picks UAE Tech Tesla Samsung SpaceX
      Major Tech Companies
      • Apple News
      • Google News
      • Meta News
      • Microsoft News
      • Amazon News
      • Samsung News
      • Nvidia News
      • OpenAI News
      • Tesla News
      • AMD News
      • Anthropic News
      • Elbit News
      AI & Emerging Tech
      • AI Regulation News
      • AI Safety News
      • AI Adoption
      • Quantum Computing News
      • Robotics News
      Key People
      • Sam Altman News
      • Jensen Huang News
      • Elon Musk News
      • Mark Zuckerberg News
      • Sundar Pichai News
      • Tim Cook News
      • Satya Nadella News
      • Mustafa Suleyman News
      Global Tech & Policy
      • Israel Tech News
      • India Tech News
      • Taiwan Tech News
      • UAE Tech News
      Startups & Emerging Tech
      • Series A News
      • Series B News
      • Startup News
      Tallwire
      Facebook X (Twitter) LinkedIn Threads Instagram RSS
      • Tech
      • Entertainment
      • Business
      • Government
      • Academia
      • Transportation
      • Legal
      • Press Kit
      © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

      Type above and press Enter to search. Press Esc to cancel.