What's Happening?
The Coruna exploit kit, a sophisticated tool capable of compromising Apple iPhones running iOS versions 13.0 through 17.2.1, has been identified by Google's Threat Intelligence Group (GTIG). This toolkit includes five full exploit chains and 23 vulnerabilities
aimed at infiltrating devices to extract sensitive financial data. Initially linked to a commercial surveillance vendor, the toolkit was later used in targeted attacks against Ukrainian users by a suspected Russian espionage group, UNC6353. By late 2025, the exploit framework was also used in broader campaigns by a financially motivated actor from China, UNC6691, distributing the exploits through fake financial and cryptocurrency websites. The toolkit employs device fingerprinting, automatic selection of WebKit vulnerabilities, and techniques to bypass Apple security protections.
Why It's Important?
The discovery of the Coruna exploit kit highlights the evolving nature of cybersecurity threats, particularly those targeting widely used consumer devices like iPhones. The ability of this toolkit to bypass security measures and extract financial data poses a significant risk to users, especially those using older iOS versions. This development underscores the importance of regular software updates and the implementation of advanced security features by tech companies to protect users. The involvement of state-linked actors in deploying such tools also raises concerns about the intersection of cybersecurity and international espionage, potentially impacting diplomatic relations and national security.
What's Next?
In response to the Coruna exploit kit, users are advised to update their devices to the latest iOS versions or enable Lockdown Mode if updates are not possible. Google has added related malicious domains to its Safe Browsing list to prevent further exploitation. The cybersecurity community will likely continue to monitor and analyze the toolkit to develop more robust defenses. Additionally, this case may prompt Apple and other tech companies to enhance their security protocols and collaborate with cybersecurity researchers to address emerging threats.









