Coruna Toolkit: iPhone Zero-days Move into Criminal Markets
Context and chronology
A compact exploit framework known as Coruna has been observed circulating in criminal markets, chaining WebKit zero-days to compromise older iPhones running iOS 13–17.2.1. Technical analysis shows the exploit chain targets Safari’s rendering engine rather than alternate browser shells, and it includes checks that skip devices with Apple’s most stringent runtime protections enabled; devices with hardened mitigations were not subject to the active payloads. The core framework retains high-quality engineering, while criminal builds exhibit newly grafted modules—chiefly geared toward cryptocurrency theft and media exfiltration—that analysts describe as less polished than the exploit plumbing.
Network telemetry tied to a cluster of command-and-control servers linked to a commercialized Coruna variant indicates scale on the order of tens of thousands of endpoints; independent traffic analysis estimates roughly 42,000 suspicious connections. Forensic signals and marketplace advertisements further indicate the criminalized variant was offered as a turnkey product: buyers obtained a management panel and payload-builder capabilities that let operators assemble installers and host them on self-managed infrastructure. That self-hosting model, combined with distribution via messaging lures, phishing, and masqueraded droppers, multiplies instances and complicates traditional takedown approaches.
Observed payload capabilities align with broader trends in off‑the‑shelf mobile spyware: remote camera activation, on‑demand screen capture, live audio monitoring, location tracking, and comprehensive data exfiltration paths (app activity, SIM/carrier identifiers, and message previews). In the Coruna cases reviewed, financial compromise routines favored clipboard-manipulation and credential harvesting—consistent with opportunistic crypto-theft modules appended after the exploit leak. Indicators of compromise are often subtle (battery drain, unexplained transactions, or new background processes), making detection difficult for consumers and nontechnical operators.
Attribution remains contested. Some code fragments echo previously disclosed toolsets, but the majority of Coruna’s architecture appears tightly integrated and novel—consistent with a single-author exploit engineering effort, according to one analyst. This mix of overlap and originality fuels two plausible narratives: either a state-origin toolkit leaked and was rapidly adapted, or multiple authors converged on shared exploit primitives. Both scenarios point to the same operational risk: brokerage and resale rapidly amplify otherwise contained offensive capabilities.
The incident has immediate defender implications. Vendors should prioritize emergency mitigations in WebKit and extend emergency advisories for legacy iOS installs; enterprise mobile teams need prioritized telemetry hunts for Safari‑based exploitation indicators, configuration hardening to disable risky background privileges, and transaction‑integrity monitoring for possible address substitution. Because many criminal buyers host independent control instances, defenders and law enforcement must prepare for a multiplicity of C2 endpoints rather than a single takedown target.
Policy and procurement implications are also acute. Recent criminal prosecutions, including a multi-year sentence for an exploit-broker executive, demonstrate enforcement is possible but insufficient alone; the underlying market incentives—high valuations for zero-days plus weak custody and audit controls—remain the primary driver of leakage. Expect renewed calls for contractual custody requirements, third-party audits of offensive tooling, and clearer liability rules for contractors handling vulnerability stockpiles.
Operationally, this episode underscores a systemic pattern: polished exploit frameworks can leak, be repackaged with lower-quality criminal payloads, and then reach large victim populations through decentralized hosting and common distribution channels. The combination of high‑quality exploit code and widespread, self-hosted control panels changes the remediation calculus for both vendors and investigators and accelerates the need for coordinated public‑private responses.
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you
ZeroDayRAT: Commercial spyware kit offers comprehensive remote control of Android and iOS devices
A commercially marketed spyware package circulating on Telegram equips buyers to fully surveil and control infected Android and iOS phones, combining continuous credential and clipboard theft with persistent device monitoring. Researchers warn operators also adopt resilient distribution tactics—including droppers, mirrored hosting and abuse of public repositories—that speed payload rotation and complicate takedown.

APT37 expands toolkit to pierce air gaps using removable media and cloud C2
Zscaler observed a December 2025 APT37 campaign that combined five newly identified modules — including a memory‑resident loader, a backdoored interpreter runtime, a USB relay spreader and an Android surveillance app — to pierce air‑gapped enclaves while using a mainstream cloud storage service for command-and-control. Defenders should couple stricter removable‑media controls with identity‑first telemetry and cross‑service signal fusion; platform takedowns help but do not eliminate the underlying tradecraft.
Critical OpenClaw Flaw Enabled Remote Hijack Through Malicious Web Page
A newly disclosed OpenClaw vulnerability (CVE-2026-25253) let a single malicious webpage steal a browser-exposed token and escalate it into full gateway access and host command execution; OpenClaw released a fix in 2026.1.29. Independent scans and research also found large-scale operational exposure—including hundreds of internet-reachable admin interfaces, unmoderated Moltbook skill posts with hidden prompt‑injection fragments, and separate misconfigurations that leaked millions of API tokens and tens of thousands of emails—so operators must patch, revoke keys, inventory reachable instances, and tighten access and content‑distribution controls immediately.
Former Trenchant Executive Admitted Selling Eight Zero‑Day Exploits to Russian Broker, DOJ Says
A former Trenchant general manager pleaded guilty to selling eight stolen zero‑day exploits to a Russian exploit broker, netting about $1.3 million in cryptocurrency. U.S. prosecutors say the tools could have enabled access to millions of devices and are seeking heavy penalties, including nine years in prison and $35 million in restitution.
CrashFix: Chrome extension that forces browser crashes to deliver ModeloRAT targets corporate networks
A malicious Chrome add-on masquerading as an ad blocker deliberately destabilizes the browser to trick users into running clipboard-pasted commands that install a Python-based remote access trojan. The campaign, attributed to an actor tracked as KongTuke and active since early 2025, focuses on domain-joined machines in corporate environments and uses a timed denial-of-service loop to sustain the social-engineering lure.

Google rolls Android updates to fix exploited Qualcomm zero-day
Google issued Android security updates patching roughly 130 vulnerabilities, including an exploited Qualcomm graphics zero-day, CVE-2026-21385 (CVSS 7.8). Organizations must prioritize devices on the 2026-03-01 and 2026-03-05 patch levels to close immediate exposure and treat this as part of a wider cross‑vendor wave of in‑the‑wild fixes (see recent Chrome and document‑parser advisories) that increases urgency for rapid deployment and verification.

Dell RecoverPoint Zero-Day Exploited by China-Linked Cyberespionage Group
A China-linked espionage cluster abused a hardcoded-credential flaw in Dell RecoverPoint for Virtual Machines to escalate privileges, move laterally, and deploy bespoke malware; Dell released patch 6.0.3.1 HF1 and vendors published IoCs and behavioral indicators. The incident underscores a broader trend of rapid weaponization of management and recovery tooling, forcing organisations to pair urgent patching with compensating network controls and extended telemetry into virtualization stacks.

CERT-In alerts users to high-risk flaws in Apple Pages/Keynote and Google Chrome; apply patches now
India’s national cybersecurity agency has identified exploitable vulnerabilities in Apple Pages/Keynote and Google’s desktop Chrome that could allow data disclosure or remote code execution. Vendors issued fixes in late January 2026; organisations should prioritise deploying those updates immediately and treat them in the context of a broader trend of vendor emergency patches for document- and API-handling flaws.