iPhone hacking techniques have sometimes been described almost like rare and elusive animals: Hackers have used them so stealthily and carefully against such a small number of hand-picked targets that they’re only rarely seen in the wild. Now a recent spate of espionage and cybercriminal campaigns has instead deployed those same phone-takeover tools, embedded in infected websites, to indiscriminat...
The strongest version of this narrative highlights a concerning evolution in cyber threats: the democratization of advanced hacking tools. The discovery of DarkSword and Coruna reveals how state-sponsored actors are leveraging indiscriminate, web-based attacks to compromise devices at scale, marking a departure from the traditional, highly targeted espionage operations. The fact that these tools were embedded in legitimate Ukrainian websites—including government and news platforms—suggests a del...
