A DarkSword hangs over unpatched iPhones
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。用户给的文章是关于Google研究人员发现的iOS漏洞DarkSword,以及相关的恶意软件Ghostblade。 首先,我要理解文章的主要内容。DarkSword是一个利用六个iOS和Safari漏洞的攻击链,自去年底被多个攻击者用于感染iPhone。它通过访问恶意网站进行drive-by攻击,影响iOS 18.4到18.7版本。被感染后,Ghostblade会窃取大量数据,包括通讯、照片、健康数据、加密货币相关信息等,并删除痕迹。 接下来,我需要提取关键点:DarkSword的发现者、影响范围、攻击方式、恶意软件的功能以及防范措施。然后用简洁的语言把这些点整合起来,确保在100字以内。 可能的结构是:Google发现DarkSword漏洞链,影响多个iOS版本,通过访问恶意网站传播Ghostblade恶意软件,窃取大量数据并删除痕迹。建议用户更新系统和启用Lockdown模式。 现在检查字数是否在限制内,并确保信息准确无误。 </think> Google研究人员发现名为DarkSword的iOS漏洞链,利用六个漏洞通过恶意网站感染iPhone(iOS 18.4-18.7),部署Ghostblade恶意软件窃取通讯、照片、健康数据及加密货币相关信息,并删除痕迹。建议用户更新系统并启用Lockdown模式以防范此类攻击。 2026-3-19 12:27:53 Author: www.malwarebytes.com(查看原文) 阅读量:4 收藏

Researchers at Google have identified an iOS exploit chain, named DarkSword, that has been used since late last year by multiple actors to infect iPhones with malware in targeted attacks.

DarkSword combines six vulnerabilities in iOS and Safari to deploy malware on the device. It demonstrates, once again, how important it is to keep up with updates.

The exploit works against iPhones running iOS versions 18.4 through 18.7, and simply visiting a malicious or compromised website with a vulnerable device can be enough to get infected (a drive‑by attack).

The researchers found that several groups are using the tool to attack their preferred targets. DarkSword has been used both by commercial spyware vendors and by state‑backed actors, with campaigns observed in Saudi Arabia, Turkey, Malaysia, and Ukraine.

In Saudi Arabia, attackers used a fake Snapchat lookalike. In Ukraine, attackers compromised at least two Ukrainian websites, including a government site.

Upon successful exploitation, malware is executed on the device. The type of malware depends on the attacker. In the Ukrainian campaign, that malware is known as Ghostblade, one example of a payload delivered via the DarkSword exploit chain.

Ghostblade is a JavaScript‑based data‑stealer that exfiltrates unique device identifiers, SMS and iMessage messages, call history, contacts, Wi‑Fi configuration and passwords, Safari cookies and browsing history, location data, notes, calendar entries, health data, photos, iCloud Drive files, SIM information, emails, a list of installed apps, saved passwords, and the message history from Telegram and WhatsApp.

Beyond this, Ghostblade stands out because it also targets cryptocurrency‑related data, actively seeking apps for major exchanges (Coinbase, Binance, Kraken, Kucoin, OKX, Mexc) and wallet apps (Ledger, Trezor, Metamask, Exodus, Uniswap, Phantom, Gnosis Safe). Researchers note that Ghostblade is not built for long‑term surveillance: once it has collected the data, it deletes its temporary files and terminates itself.

The risks

Vulnerable devices can be infected just by visiting that one malicious or compromised website. And the consequences can be severe. DarkSword turns a single website visit into full device compromise, followed by Ghostblade exfiltrating as much data as it can in one go.

  • Data theft: Ghostblade and related payloads can grab communications (SMS, iMessage, Telegram, WhatsApp, email), photos, health data, location history, Wi‑Fi credentials, keychain items, and more in one sweep.
  • Crypto theft and profiling: The malware enumerates specific exchange and wallet apps, which allows both direct theft and lets criminals use the stolen information to build a detailed profile of financially interesting targets.
  • Forensic evasion: Because Ghostblade wipes its own traces after stealing all that information, it can take a long time before victims figure out something is wrong. Many victims may never know they were compromised.

Since the same exploit kit is being reused across commercial surveillance firms and state‑aligned actors, the number of campaigns and victims will increase over time.

The solutions

Update to the latest iOS available for your device. DarkSword can affect iOS versions 18.4 through 18.7, and Apple’s recent releases include fixes for CVE‑2026‑20700 and related vulnerabilities.

If you have reason to believe you’re a potential target for attacks of this nature (journalists, activists, or people that have access to sensitive data) it is advisable to enable Lockdown Mode:

  1. Open the Settings app.
  2. Tap Privacy & Security.
  3. Scroll down, tap Lockdown Mode, then tap Turn On Lockdown Mode.
  4. Read the presented information and tap Turn On Lockdown Mode.
  5. Tap Turn On & Restart.
  6. Enter your device passcode when prompted.

Do inform yourself about the consequences of turning on Lockdown Mode. It makes your device a lot less user-friendly, but it has proven effective against highly targeted attacks.

Here are some more general tips:

  • Use up-to-date, real-time anti-malware protection for your device to block malicious websites where possible.
  • Avoid following links sent in unsolicited messages, especially for services like Snapchat, crypto exchanges, banking, or email.
  • Use content blockers (for example Malwarebytes Browser Guard) in Safari to reduce exposure to malicious content (though they are not a silver bullet for zero‑days).
  • Move high‑value crypto assets to hardware wallets or dedicated devices, and use mobile wallets only for smaller amounts.
  • Use a password manager with strong authentication, and turn on extra security settings like Face ID/Touch ID and avoid auto‑filling high‑risk credentials.
  • Enable multi-factor authentication (FIDO2 security keys or app‑based 2FA) on exchanges and financial accounts, so stolen passwords alone are not enough to plunder your accounts.
  • Regularly review app permissions and revoke access to sensitive data (Location, Photos, Contacts, Microphone, Camera, Health) revoke where unnecessary.

We don’t just report on phone security—we provide it

Cybersecurity risks should never spread beyond a headline. Keep threats off your mobile devices by downloading Malwarebytes for iOS, and Malwarebytes for Android today.

About the author

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.


文章来源: https://www.malwarebytes.com/blog/mobile/2026/03/a-darksword-hangs-over-unpatched-iphones
如有侵权请联系:admin#unsafe.sh