Ecosystem
Wallet

Suspected US-Origin iPhone Exploit Kit Reached Russian Spies And Chinese Crypto Thieves, Google Warns

Suspected US-Origin iPhone Exploit Kit Reached Russian Spies And Chinese Crypto Thieves, Google Warns

Google's Threat Intelligence Group published research detailing a sophisticated iOS exploit framework called Coruna - containing 23 vulnerabilities across five full exploit chains - that was used by suspected Russian espionage operatives and Chinese cryptocurrency scammers throughout 2025.

Mobile security firm iVerify separately concluded the codebase bears hallmarks of U.S. government-developed tools, calling it the first known case of likely nation-state iOS capabilities repurposed for mass criminal use.

All vulnerabilities exploited by Coruna have been patched in current iOS versions. Devices running iOS 17.2.1 and older, released through December 2023, remain the affected range.

What Happened

Google tracked Coruna through three distinct operators across 2025. It first appeared in February in an exploit chain used by a customer of an unnamed commercial surveillance vendor.

By summer, the identical JavaScript framework appeared as hidden iframes on compromised Ukrainian websites, selectively targeting iPhone users by geolocation - attributed to UNC6353, a suspected Russian espionage group. By late 2025, the full toolkit had been deployed across hundreds of fake Chinese-language cryptocurrency and gambling websites, compromising an estimated 42,000 devices in a single campaign.

The kit operates as a drive-by attack: no click required. A target visiting a compromised site triggers silent JavaScript that fingerprints the device and delivers a tailored exploit chain. The criminal-adapted payload scans for BIP39 seed phrases, harvests MetaMask and Trust Wallet data, and exfiltrates credentials to command-and-control servers.

Read also: Women Hold 25% Of Crypto Users Despite Controlling A Growing Share Of Global Wealth, Bitget Data Show

Why It Matters

iVerify co-founder Rocky Cole - a former NSA analyst - said Coruna's codebase is "superb" and shares engineering fingerprints with modules previously linked publicly to U.S. government programs, including components from Operation Triangulation, a 2023 iOS campaign that Russia officially attributed to the NSA. Washington has never commented on that allegation.

Cole described the situation as a potential "EternalBlue moment" - referencing the NSA-developed Windows exploit stolen in 2017 that later enabled the WannaCry and NotPetya attacks.

Google noted an active "second-hand market" for zero-day exploit frameworks, with the Coruna trail reinforcing how state-grade tools migrate through brokers into criminal infrastructure with no clear handoff point.

The NSA did not respond to requests for comment. Apple has issued patches covering all known Coruna vulnerabilities.

Read next: JPMorgan's Dimon Draws A Hard Line On Stablecoin Interest - How It Could Kill The CLARITY Act

Disclaimer and Risk Warning: The information provided in this article is for educational and informational purposes only and is based on the author's opinion. It does not constitute financial, investment, legal, or tax advice. Cryptocurrency assets are highly volatile and subject to high risk, including the risk of losing all or a substantial amount of your investment. Trading or holding crypto assets may not be suitable for all investors. The views expressed in this article are solely those of the author(s) and do not represent the official policy or position of Yellow, its founders, or its executives. Always conduct your own thorough research (D.Y.O.R.) and consult a licensed financial professional before making any investment decision.
Latest News
Show All News