O.putty PDocsCybersecurity
Related
Meta Unveils New Security Boosts for Encrypted Backups: Fleet Key Protocol and Public Audit TrailHow to Mitigate the Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability (CVE-2026-20182)How to Prepare for Autonomous Vulnerability Discovery AI: A Practical Guide for Cybersecurity TeamsNavigating Airline Shutdowns: Lessons from Spirit Airlines' CollapseMassive Canvas Login Portal Hacks: ShinyHunters Extortion Campaign Targets Hundreds of UniversitiesAttackers Exploit Machine Speed: Why Human-Only Defense Fails at Execution PhaseBuilding a Three-Axis Camera Slider with Repurposed 3D Printer ComponentsHow Meta Fortifies Its End-to-End Encrypted Backup System: A Technical Walkthrough

DarkSword iOS Exploit Unleashed: Six Zero-Day Vulnerabilities Weaponized by State Actors

Last updated: 2026-05-08 12:17:14 · Cybersecurity

DarkSword iOS Exploit Unleashed: Six Zero-Day Vulnerabilities Weaponized by State Actors

A sophisticated iOS exploit chain, dubbed DarkSword, has been actively targeting devices running iOS versions 18.4 through 18.7 since at least November 2025. The chain, identified by Google Threat Intelligence Group (GTIG), employs six zero-day vulnerabilities in a single full-chain exploit to deliver final-stage payloads.

DarkSword iOS Exploit Unleashed: Six Zero-Day Vulnerabilities Weaponized by State Actors
Source: www.schneier.com

"This is one of the most advanced iOS exploit chains we’ve observed to date," said a GTIG spokesperson. "The use of six separate zero-days in a coordinated attack chain suggests a highly resourced developer, likely with government backing."

Multiple commercial surveillance vendors and suspected state-sponsored actors have deployed DarkSword in distinct campaigns across Saudi Arabia, Turkey, Malaysia, and Ukraine. GTIG has linked the exploit to three malware families—GHOSTBLADE, GHOSTKNIFE, and GHOSTSABER—which are dropped post-compromise.

One week after GTIG identified DarkSword, a version of the exploit chain leaked onto the open internet, enabling broader misuse beyond the initial threat actors. The leak has raised concerns about a surge in attacks against unpatched iOS devices worldwide.

GTIG notes that the threat group UNC6353, a suspected Russian espionage team previously observed using the Coruna iOS exploit kit, has now integrated DarkSword into their watering hole campaigns.

Background

DarkSword is a full-chain iOS vulnerability exploit that Google believes was designed by a government entity. It requires no user interaction and silently compromises devices through a chain of six distinct zero-day vulnerabilities. GTIG recovered toolmarks in payloads that led to the naming convention.

The exploit supports iOS versions 18.4 through 18.7 and utilizes six separate zero-day vulnerabilities to achieve kernel-level access and bypass security mitigations. This mirrors the earlier Coruna exploit kit, which also saw widespread adoption across multiple threat actors. You can read more about previous iOS exploit trends in our analysis section.

DarkSword iOS Exploit Unleashed: Six Zero-Day Vulnerabilities Weaponized by State Actors
Source: www.schneier.com

What This Means

For ordinary iPhone users, the immediate risk is low—provided you have installed all available iOS updates. Apple has likely patched the vulnerabilities exploited by DarkSword in the months since its discovery. However, the leak of the exploit chain means that even less sophisticated actors may now attempt to use it against older, unpatched devices.

Organizations with high-value targets—journalists, activists, diplomats, or corporate executives—should ensure all iOS devices are updated to the latest version immediately. GTIG recommends enabling automatic updates and using device management tools to enforce patch compliance.

The proliferation of DarkSword mirrors a troubling trend: advanced, government-grade exploits are leaking into the broader cybercriminal ecosystem. This lowers the barrier for espionage and surveillance operations. As GTIG states, "Vigilant patching remains the single most effective defense against zero-day exploits."

Given that this news is already a month old, most users are likely safe if they update regularly. Check your iOS version and install any pending updates now.