Recent cybersecurity findings have revealed a sophisticated hacking operation targeting iPhone users via an advanced tool named DarkSword. A newer iteration of this spyware was inadvertently leaked and made available on GitHub, raising alarm among industry experts.
Cybersecurity researchers caution that this leak will empower malicious actors to exploit vulnerabilities in iPhones and iPads operating on outdated versions of iOS, particularly those not updated to the latest iOS 26. Apple’s data indicates that this issue could potentially impact hundreds of millions of devices still in use.
Matthias Frielingsdorf, co-founder of mobile security firm iVerify, warned that the simplicity of repurposing these tools for nefarious use makes them a significant threat. He noted that the leaked DarkSword files are easily manipulated, comprising basic HTML and JavaScript, which means even those lacking in-depth iOS knowledge can utilise them with minimal setup time.
Frielingsdorf emphasised that these exploits are ready to use straight away, requiring no specialized iOS expertise. Kimberly Samra from Google, which has previously examined DarkSword, echoed his concerns, affirming the ease of access and danger of the leaked materials.
A security enthusiast, known as matteyeux, recounted successfully hacking an iPad running on an older version of iOS using the accessible DarkSword samples circulating online. In response to the emerging threat, Apple’s Sarah O’Rourke disclosed that the company is aware of the exploit and released an emergency update on March 11 for devices unable to upgrade to the latest iOS versions. O’Rourke stressed that software updates are crucial for maintaining the security of Apple products, asserting that devices with the latest updates are not vulnerable to these attacks.
While the code details found in the leak are not publicly revealed due to their potential to be exploited actively, comments within the code outline how the DarkSword exploit can exfiltrate sensitive files from iOS devices, sending captured data to attacker-controlled servers. Notably, the spyware was reportedly used by Russian state hackers against Ukrainian entities, highlighting its serious implications in geopolitical cyber warfare.
According to various sources, including iVerify and Google, DarkSword particularly targets devices operating on iOS 18 or earlier. Apple statistics suggest that a significant quarter of all iPhone and iPad users have not updated their systems, posing a substantial security risk to these users.
Frielingsdorf strongly advises all users to update their devices immediately to mitigate the risk posed by DarkSword and similar threats. This alarming discovery followed shortly after the revelation of another hacking toolkit, Coruna, previously developed by L3Harris for military and governmental applications.
As these threats evolve and proliferate, staying updated and vigilant about cybersecurity is paramount for users of Apple devices.
Fanpage:Â TechArena.au
Watch more about AI – Artificial Intelligence


