BotBeat
...
← Back

> ▌

Google / AlphabetGoogle / Alphabet
RESEARCHGoogle / Alphabet2026-03-18

Google Discovers DarkSword: Proliferating iOS Exploit Chain Used by Multiple State-Sponsored and Commercial Threat Actors

Key Takeaways

  • ▸DarkSword is a sophisticated full-chain iOS exploit leveraging six zero-day vulnerabilities, supporting iOS 18.4-18.7, and capable of deploying multiple malware families for complete device compromise
  • ▸Multiple distinct threat actors—including commercial surveillance vendors and suspected state-sponsored groups like UNC6353 and UNC6748—have adopted DarkSword since November 2025 for campaigns targeting victims in Saudi Arabia, Turkey, Malaysia, and Ukraine
  • ▸All vulnerabilities have been patched in iOS 26.3; Google urges immediate device updates or activation of Lockdown Mode, and has added malicious domains to Safe Browsing protection
Source:
Hacker Newshttps://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain↗

Summary

Google Threat Intelligence Group (GTIG) has identified DarkSword, a sophisticated iOS full-chain exploit leveraging six zero-day vulnerabilities to achieve complete device compromise. Since November 2025, the exploit chain has been adopted by multiple threat actors including suspected state-sponsored groups and commercial surveillance vendors, with campaigns targeting users in Saudi Arabia, Turkey, Malaysia, and Ukraine. DarkSword supports iOS versions 18.4 through 18.7 and deploys three distinct malware families—GHOSTBLADE, GHOSTKNIFE, and GHOSTSABER—following successful compromises.

The proliferation of DarkSword mirrors the previously discovered Coruna iOS exploit kit, with notable threat actors like UNC6353 (a suspected Russian espionage group) incorporating the new exploit chain into their operations. UNC6748 has been observed using DarkSword in watering hole campaigns featuring Snapchat-themed websites to target Saudi Arabian users, while additional threat actors have deployed it across other regions. Google reported all vulnerabilities to Apple in late 2025, with patches released in iOS 26.3, though most vulnerabilities were patched earlier. The company has added DarkSword delivery domains to Safe Browsing and recommends users update to the latest iOS version or enable Lockdown Mode for enhanced protection.

Editorial Opinion

The discovery of DarkSword underscores the persistent sophistication of iOS exploits and the concerning trend of exploit chain sharing among disparate threat actors. This proliferation pattern—similar to the Coruna kit—suggests that once vulnerabilities are developed, they rapidly become commoditized tools across the threat landscape. Google's rapid disclosure and coordination with industry partners demonstrates effective security research practices, though the targeting of multiple geopolitical regions highlights how critical mobile device security remains for vulnerable populations.

CybersecurityRegulation & PolicyAI Safety & AlignmentPrivacy & Data

More from Google / Alphabet

Google / AlphabetGoogle / Alphabet
PRODUCT LAUNCH

Google DeepMind Launches Gemini 3.5 Flash: New Lightweight AI Model

2026-05-20
Google / AlphabetGoogle / Alphabet
PARTNERSHIP

Singapore Inks AI Deals with Google

2026-05-20
Google / AlphabetGoogle / Alphabet
UPDATE

Google Overhauls Workspace App Icons with Gradient Design to Emphasize AI Integration

2026-05-20

Comments

Suggested

AnthropicAnthropic
POLICY & REGULATION

Advanced AI Models Bring Government to 'Reflection Point,' CIA Official Says

2026-05-20
OpenAIOpenAI
FUNDING & BUSINESS

OpenAI Prepares for IPO After Musk Lawsuit Threat Clears

2026-05-20
NVIDIANVIDIA
POLICY & REGULATION

China Bans Nvidia RTX 5090D V2 During CEO Huang's Visit, Escalating AI Hardware Trade War

2026-05-20
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us