BotBeat
...
← Back

> ▌

Google / AlphabetGoogle / Alphabet
RESEARCHGoogle / Alphabet2026-03-18

Google Discovers DarkSword: Proliferating iOS Exploit Chain Used by Multiple State-Sponsored and Commercial Threat Actors

Key Takeaways

  • ▸DarkSword is a sophisticated full-chain iOS exploit leveraging six zero-day vulnerabilities, supporting iOS 18.4-18.7, and capable of deploying multiple malware families for complete device compromise
  • ▸Multiple distinct threat actors—including commercial surveillance vendors and suspected state-sponsored groups like UNC6353 and UNC6748—have adopted DarkSword since November 2025 for campaigns targeting victims in Saudi Arabia, Turkey, Malaysia, and Ukraine
  • ▸All vulnerabilities have been patched in iOS 26.3; Google urges immediate device updates or activation of Lockdown Mode, and has added malicious domains to Safe Browsing protection
Source:
Hacker Newshttps://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain↗

Summary

Google Threat Intelligence Group (GTIG) has identified DarkSword, a sophisticated iOS full-chain exploit leveraging six zero-day vulnerabilities to achieve complete device compromise. Since November 2025, the exploit chain has been adopted by multiple threat actors including suspected state-sponsored groups and commercial surveillance vendors, with campaigns targeting users in Saudi Arabia, Turkey, Malaysia, and Ukraine. DarkSword supports iOS versions 18.4 through 18.7 and deploys three distinct malware families—GHOSTBLADE, GHOSTKNIFE, and GHOSTSABER—following successful compromises.

The proliferation of DarkSword mirrors the previously discovered Coruna iOS exploit kit, with notable threat actors like UNC6353 (a suspected Russian espionage group) incorporating the new exploit chain into their operations. UNC6748 has been observed using DarkSword in watering hole campaigns featuring Snapchat-themed websites to target Saudi Arabian users, while additional threat actors have deployed it across other regions. Google reported all vulnerabilities to Apple in late 2025, with patches released in iOS 26.3, though most vulnerabilities were patched earlier. The company has added DarkSword delivery domains to Safe Browsing and recommends users update to the latest iOS version or enable Lockdown Mode for enhanced protection.

Editorial Opinion

The discovery of DarkSword underscores the persistent sophistication of iOS exploits and the concerning trend of exploit chain sharing among disparate threat actors. This proliferation pattern—similar to the Coruna kit—suggests that once vulnerabilities are developed, they rapidly become commoditized tools across the threat landscape. Google's rapid disclosure and coordination with industry partners demonstrates effective security research practices, though the targeting of multiple geopolitical regions highlights how critical mobile device security remains for vulnerable populations.

CybersecurityRegulation & PolicyAI Safety & AlignmentPrivacy & Data

More from Google / Alphabet

Google / AlphabetGoogle / Alphabet
RESEARCH

Deep Dive: Optimizing Sharded Matrix Multiplication on TPU with Pallas

2026-04-05
Google / AlphabetGoogle / Alphabet
INDUSTRY REPORT

Kaggle Hosts 37,000 AI-Generated Podcasts, Raising Questions About Content Authenticity

2026-04-04
Google / AlphabetGoogle / Alphabet
PRODUCT LAUNCH

Google Releases Gemma 4 with Client-Side WebGPU Support for On-Device Inference

2026-04-04

Comments

Suggested

OracleOracle
POLICY & REGULATION

AI Agents Promise to 'Run the Business'—But Who's Liable When Things Go Wrong?

2026-04-05
AnthropicAnthropic
POLICY & REGULATION

Anthropic Explores AI's Role in Autonomous Weapons Policy with Pentagon Discussion

2026-04-05
PerplexityPerplexity
POLICY & REGULATION

Perplexity's 'Incognito Mode' Called a 'Sham' in Class Action Lawsuit Over Data Sharing with Google and Meta

2026-04-05
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us