BotBeat
...
← Back

> ▌

Google / AlphabetGoogle / Alphabet
RESEARCHGoogle / Alphabet2026-03-27

Google Reveals DarkSword iOS Exploit Chain Used by Multiple State-Sponsored and Commercial Threat Actors

Key Takeaways

  • ▸DarkSword exploit chain uses six zero-day vulnerabilities to fully compromise iOS devices running versions 18.4-18.7, supporting deployment of three distinct malware families
  • ▸Multiple threat actors including suspected state-sponsored groups and commercial surveillance vendors have adopted DarkSword since November 2025, with confirmed campaigns targeting Saudi Arabia, Turkey, Malaysia, and Ukraine
  • ▸Google has coordinated with Apple for patching (iOS 26.3) and industry partners Lookout and iVerify; users are urged to update immediately or enable Lockdown Mode as interim protection
Source:
Hacker Newshttps://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain↗

Summary

Google Threat Intelligence Group (GTIG) has identified a sophisticated iOS full-chain exploit called DarkSword that leverages six zero-day vulnerabilities to fully compromise Apple devices running iOS 18.4 through 18.7. Since November 2025, the exploit has been adopted by multiple threat actors including suspected state-sponsored groups and commercial surveillance vendors targeting users in Saudi Arabia, Turkey, Malaysia, and Ukraine. The discovery mirrors the proliferation of the Coruna iOS exploit kit and includes three distinct malware families—GHOSTBLADE, GHOSTKNIFE, and GHOSTSABER—deployed post-compromise.

Google has coordinated disclosure with Apple, and all vulnerabilities were patched with iOS 26.3 release. The research, published in collaboration with Lookout and iVerify, documents multiple campaigns including one by UNC6748 using a Snapchat-themed phishing website, and involvement by UNC6353, a suspected Russian espionage group. Google has added delivery domains to Safe Browsing and strongly recommends users update to the latest iOS version or enable Lockdown Mode for enhanced protection.

  • The exploit's proliferation across disparate threat actors demonstrates increasing availability and commoditization of sophisticated iOS compromise capabilities in the threat landscape

Editorial Opinion

The DarkSword discovery underscores a critical vulnerability in iOS security infrastructure and the accelerating commoditization of sophisticated exploit chains. The fact that multiple unrelated threat actors—from state sponsors to commercial surveillance vendors—have rapidly adopted this single toolkit suggests either a troubling breach in exploit development or deliberate distribution channels that should alarm Apple and the broader security community. While Google's coordinated disclosure and patching response is commendable, the six-month window from November 2025 to full mitigation represents a significant gap during which millions of users remained at risk.

CybersecurityRegulation & PolicyAI Safety & AlignmentPrivacy & Data

More from Google / Alphabet

Google / AlphabetGoogle / Alphabet
PRODUCT LAUNCH

Google DeepMind Launches Gemini 3.5 Flash: New Lightweight AI Model

2026-05-20
Google / AlphabetGoogle / Alphabet
PARTNERSHIP

Singapore Inks AI Deals with Google

2026-05-20
Google / AlphabetGoogle / Alphabet
UPDATE

Google Overhauls Workspace App Icons with Gradient Design to Emphasize AI Integration

2026-05-20

Comments

Suggested

AnthropicAnthropic
POLICY & REGULATION

Advanced AI Models Bring Government to 'Reflection Point,' CIA Official Says

2026-05-20
OpenAIOpenAI
FUNDING & BUSINESS

OpenAI Prepares for IPO After Musk Lawsuit Threat Clears

2026-05-20
NVIDIANVIDIA
POLICY & REGULATION

China Bans Nvidia RTX 5090D V2 During CEO Huang's Visit, Escalating AI Hardware Trade War

2026-05-20
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us