BotBeat
...
← Back

> ▌

Google / AlphabetGoogle / Alphabet
RESEARCHGoogle / Alphabet2026-03-20

Google Threat Intelligence Exposes DarkSword iOS Exploit Chain Used by Multiple Threat Actors Globally

Key Takeaways

  • ▸DarkSword is a full-chain iOS exploit using six zero-day vulnerabilities affecting iOS 18.4-18.7, deployed by multiple threat actors including suspected state-sponsored groups
  • ▸The exploit chain has been used in targeted campaigns across Saudi Arabia, Turkey, Malaysia, and Ukraine since at least November 2025
  • ▸Google coordinated with Apple to patch vulnerabilities in iOS 26.3, and has added delivery domains to Safe Browsing; users are strongly urged to update or enable Lockdown Mode
Source:
Hacker Newshttps://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain↗

Summary

Google Threat Intelligence Group (GTIG) has discovered DarkSword, a sophisticated iOS full-chain exploit leveraging six zero-day vulnerabilities that has been actively used by multiple commercial surveillance vendors and state-sponsored actors since November 2025. The exploit chain affects iOS versions 18.4 through 18.7 and has been observed targeting users in Saudi Arabia, Turkey, Malaysia, and Ukraine. Upon successful compromise, DarkSword deploys one of three malware families: GHOSTBLADE, GHOSTKNIFE, or GHOSTSABER.

The proliferation of DarkSword mirrors the earlier Coruna iOS exploit kit discovery, with notably UNC6353—a suspected Russian espionage group previously linked to Coruna—now incorporating DarkSword into their watering hole campaigns. GTIG identified at least one campaign by threat cluster UNC6748 that used a Snapchat-themed website to distribute the exploit to Saudi Arabian targets, complete with anti-debugging measures and Chrome-to-Safari redirection techniques.

Google reported all identified vulnerabilities to Apple in late 2025, with patches released in iOS 26.3 and earlier versions. The company has added malicious domains to Safe Browsing and urges users to update immediately, or enable Lockdown Mode if updates are not feasible. The research was published in coordination with industry partners Lookout and iVerify.

Editorial Opinion

The discovery of DarkSword underscores the ongoing sophistication of iOS-targeted attack infrastructure and the persistent threat posed by the commercialization of exploit chains across disparate threat actors. The rapid adoption of a single exploit kit by multiple surveillance vendors and state-sponsored groups demonstrates both the technical quality of the vulnerability chain and the concerning ecosystem that enables its distribution. While Apple's swift patching response is commendable, the six-month window of active exploitation highlights the importance of maintaining aggressive security postures and the limitations of patching as the sole defense mechanism.

CybersecurityRegulation & PolicyAI Safety & AlignmentPrivacy & Data

More from Google / Alphabet

Google / AlphabetGoogle / Alphabet
PRODUCT LAUNCH

Google DeepMind Launches Gemini 3.5 Flash: New Lightweight AI Model

2026-05-20
Google / AlphabetGoogle / Alphabet
PARTNERSHIP

Singapore Inks AI Deals with Google

2026-05-20
Google / AlphabetGoogle / Alphabet
UPDATE

Google Overhauls Workspace App Icons with Gradient Design to Emphasize AI Integration

2026-05-20

Comments

Suggested

AnthropicAnthropic
POLICY & REGULATION

Advanced AI Models Bring Government to 'Reflection Point,' CIA Official Says

2026-05-20
OpenAIOpenAI
FUNDING & BUSINESS

OpenAI Prepares for IPO After Musk Lawsuit Threat Clears

2026-05-20
NVIDIANVIDIA
POLICY & REGULATION

China Bans Nvidia RTX 5090D V2 During CEO Huang's Visit, Escalating AI Hardware Trade War

2026-05-20
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us