Coruna iOS exploit framework linked to Triangulation attacks
Recorded: March 26, 2026, 3:26 p.m.
| Original | Summarized |
Coruna iOS exploit framework linked to Triangulation attacks News Featured Popular LiteLLM PyPI package backdoored to steal credentials, auth tokens HackerOne discloses employee data breach after Navia hack Firefox now has a free built-in VPN with 50GB monthly data limit Infinite Campus warns of breach after ShinyHunters claims data theft TikTok for Business accounts targeted in new phishing campaign WhatsApp rolls out more AI features, iOS multi-account support Inside a Modern Fraud Attack: From Bot Signups to Account Takeovers Coruna iOS exploit framework linked to Triangulation attacks Tutorials Latest How to access the Dark Web using the Tor Browser How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11 How to use the Windows Registry Editor How to backup and restore the Windows Registry How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware How to show hidden files in Windows 7 How to see hidden files in Windows Webinars Latest Qualys BrowserCheck STOPDecrypter AuroraDecrypter FilesLockerDecrypter AdwCleaner ComboFix RKill Junkware Removal Tool Deals Categories eLearning IT Certification Courses Gear + Gadgets Security VPNs Popular Best VPNs How to change IP address Access the dark web safely Best VPN for YouTube Forums Virus Removal Guides HomeNewsSecurityCoruna iOS exploit framework linked to Triangulation attacks Coruna iOS exploit framework linked to Triangulation attacks By Bill Toulas March 26, 2026 The Coruna exploit kit is an evolution of the framework used in the Operation Triangulation espionage campaign, which in 2023 targeted iPhones via zero-click iMessage exploits. Source: Kaspersky Red Report 2026: Why Ransomware Encryption Dropped 38% Related Articles: Apple Bill Toulas Previous Article Post a Comment Community Rules You need to login in order to post a comment Not a member yet? Register Now You may also like: Popular Stories Popular LiteLLM PyPI package backdoored to steal credentials, auth tokens New KB5085516 emergency update fixes Microsoft account sign-in Microsoft Exchange Online service change causes email access issues Sponsor Posts AI is a data-breach time bomb: Read the new report Cyber resilience without the complexity. Join Zero Networks to stop lateral movement fast. Synthetic Identities, Proxies & Real Identities for Sale, is yours next? Overdue a password health-check? Audit your Active Directory for free Are your AI accounts being sold on the dark web? Check for free. Upcoming Webinar Follow us: Main Sections News Community Forums Useful Resources Welcome Guide Company About BleepingComputer Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure Copyright @ 2003 - 2026 Bleeping Computer® LLC - All Rights Reserved Login Username Password Remember Me Sign in anonymously Sign in with Twitter Not a member yet? Register Now Help us understand the problem. What is going on with this comment? Spam Abusive or Harmful Inappropriate content Strong language Other Read our posting guidelinese to learn what content is prohibited. Submitting... |
The Coruna exploit framework represents a significant evolution of the Operation Triangulation espionage campaign, initially discovered by Kaspersky in 2023. Developed by attackers, Coruna is a sophisticated tool designed to silently infiltrate iPhones, leveraging over 23 zero-day vulnerabilities, including CVE-2023-32434 and CVE-2023-38606, to deploy spyware implants. Initial analysis by Kaspersky researchers revealed that the core kernel exploit within Coruna was a considerably updated version of the exploit initially used in Triangulation, dating back to 2019. This indicates a sustained, ongoing effort by the attackers to refine their techniques. The framework’s architecture is highly targeted and adaptable. It begins with a stage in Safari that performs device fingerprinting, then selects appropriate exploit chains – including Remote Code Execution (RCE) and Packet Acceptance (PAC) exploits – to achieve its objectives. Following this, Coruna retrieves encrypted metadata and proceeds with further component downloads, decrypting them using ChaCha20 and compressing them with LZMA before processing custom container formats to acquire package information. Critically, the system dynamically adjusts its operations based on the device’s architecture and iOS version, utilizing ARM64 and ARM64E processors, and explicitly checking for support for newer hardware such as the A17, M3, M3 Pro, and M3 Max chips. Boris Larin, principal security researcher at Kaspersky, highlighted the meticulous nature of Coruna’s development, stating that it is “not a patchwork of public exploits; it is a continuously maintained evolution of the original Operation Triangulation framework.” This sustained development is evidenced by the framework’s continued updates, incorporating checks for newer processor generations and iOS build versions. The attackers have expanded Coruna's functionality beyond simple espionage, as evidenced by its utilization in financially motivated campaigns focused on cryptocurrency theft through the deployment of fake exchange websites. Operation Triangulation itself was revealed to utilize undocumented features within Apple’s chips – a method bypassing normal hardware-based security protections – and was initially discovered through internal WiFi network monitoring. The emergence of Coruna mirrors the techniques employed by other exploit kits, such as DarkSword, which has been leveraged by multiple threat actors, primarily for espionage activities. The availability of DarkSword publicly, however, presents a heightened risk, as cybercriminals may now employ it against unpatched iPhones. Apple has acknowledged these threats and issued security updates to remediate the vulnerabilities exploited by Coruna and other similar exploit kits. These updates address the core flaws, representing a crucial step in safeguarding iOS devices. The evolution of Coruna and its deployment in various malicious activities underscore the importance of proactive security measures and vigilant monitoring in the face of increasingly sophisticated cyber threats. |