A DarkSword hangs over unpatched iPhones
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我得仔细阅读这篇文章,了解其主要内容。 文章主要讲的是Google的研究人员发现了一个针对iOS系统的漏洞链,叫做DarkSword。这个漏洞链被多个攻击者用于在目标攻击中感染iPhone。DarkSword结合了iOS和Safari浏览器的六个漏洞,展示了及时更新系统的重要性。 这个漏洞影响的是运行iOS 18.4到18.7版本的iPhone,访问恶意网站就会被感染。研究人员发现多个组织利用这个工具攻击特定目标,包括商业间谍软件供应商和国家支持的组织,在沙特阿拉伯、土耳其、马来西亚和乌克兰都有活动。 攻击成功后会执行恶意软件Ghostblade,它会窃取大量数据,包括设备信息、通讯记录、位置数据、密码等。此外,它还专门针对加密货币相关的应用进行窃取,并且删除自己的痕迹,使得受害者难以察觉。 解决方案包括更新到最新iOS版本,并建议高风险用户启用锁定模式。还有一些通用的安全建议,比如使用防恶意软件保护、避免点击可疑链接等。 现在我需要将这些内容浓缩到100字以内。重点包括:Google发现DarkSword漏洞链利用六个漏洞感染iPhone;影响版本18.4-18.7;访问恶意网站即可感染;攻击者包括商业和国家组织;恶意软件Ghostblade窃取大量数据;建议更新系统并启用锁定模式。 最后总结的时候要确保信息准确且简洁。 </think> Google研究人员发现名为DarkSword的iOS漏洞链被用于定向攻击iPhone设备。该漏洞链结合六个系统及Safari浏览器漏洞,在访问恶意网站时触发感染。受影响设备为运行iOS 18.4至18.7版本的iPhone。研究人员指出多个组织利用此工具进行攻击,包括商业间谍软件供应商及国家支持的组织。成功入侵后会执行Ghostblade恶意软件窃取大量敏感数据并删除痕迹。建议用户更新至最新系统版本并启用锁定模式以提高安全性。 2026-3-19 12:27:53 Author: securityboulevard.com(查看原文) 阅读量:2 收藏

Researchers at Google have identified an iOS exploit chain, named DarkSword, that has been used since late last year by multiple actors to infect iPhones with malware in targeted attacks.

DarkSword combines six vulnerabilities in iOS and Safari to deploy malware on the device. It demonstrates, once again, how important it is to keep up with updates.

The exploit works against iPhones running iOS versions 18.4 through 18.7, and simply visiting a malicious or compromised website with a vulnerable device can be enough to get infected (a drive‑by attack).

The researchers found that several groups are using the tool to attack their preferred targets. DarkSword has been used both by commercial spyware vendors and by state‑backed actors, with campaigns observed in Saudi Arabia, Turkey, Malaysia, and Ukraine.

In Saudi Arabia, attackers used a fake Snapchat lookalike. In Ukraine, attackers compromised at least two Ukrainian websites, including a government site.

Upon successful exploitation, malware is executed on the device. The type of malware depends on the attacker. In the Ukrainian campaign, that malware is known as Ghostblade, one example of a payload delivered via the DarkSword exploit chain.

Ghostblade is a JavaScript‑based data‑stealer that exfiltrates unique device identifiers, SMS and iMessage messages, call history, contacts, Wi‑Fi configuration and passwords, Safari cookies and browsing history, location data, notes, calendar entries, health data, photos, iCloud Drive files, SIM information, emails, a list of installed apps, saved passwords, and the message history from Telegram and WhatsApp.

Beyond this, Ghostblade stands out because it also targets cryptocurrency‑related data, actively seeking apps for major exchanges (Coinbase, Binance, Kraken, Kucoin, OKX, Mexc) and wallet apps (Ledger, Trezor, Metamask, Exodus, Uniswap, Phantom, Gnosis Safe). Researchers note that Ghostblade is not built for long‑term surveillance: once it has collected the data, it deletes its temporary files and terminates itself.

The risks

Vulnerable devices can be infected just by visiting that one malicious or compromised website. And the consequences can be severe. DarkSword turns a single website visit into full device compromise, followed by Ghostblade exfiltrating as much data as it can in one go.

  • Data theft: Ghostblade and related payloads can grab communications (SMS, iMessage, Telegram, WhatsApp, email), photos, health data, location history, Wi‑Fi credentials, keychain items, and more in one sweep.
  • Crypto theft and profiling: The malware enumerates specific exchange and wallet apps, which allows both direct theft and lets criminals use the stolen information to build a detailed profile of financially interesting targets.
  • Forensic evasion: Because Ghostblade wipes its own traces after stealing all that information, it can take a long time before victims figure out something is wrong. Many victims may never know they were compromised.

Since the same exploit kit is being reused across commercial surveillance firms and state‑aligned actors, the number of campaigns and victims will increase over time.

The solutions

Update to the latest iOS available for your device. DarkSword can affect iOS versions 18.4 through 18.7, and Apple’s recent releases include fixes for CVE‑2026‑20700 and related vulnerabilities.

If you have reason to believe you’re a potential target for attacks of this nature (journalists, activists, or people that have access to sensitive data) it is advisable to enable Lockdown Mode:

  1. Open the Settings app.
  2. Tap Privacy & Security.
  3. Scroll down, tap Lockdown Mode, then tap Turn On Lockdown Mode.
  4. Read the presented information and tap Turn On Lockdown Mode.
  5. Tap Turn On & Restart.
  6. Enter your device passcode when prompted.

Do inform yourself about the consequences of turning on Lockdown Mode. It makes your device a lot less user-friendly, but it has proven effective against highly targeted attacks.

Here are some more general tips:

  • Use up-to-date, real-time anti-malware protection for your device to block malicious websites where possible.
  • Avoid following links sent in unsolicited messages, especially for services like Snapchat, crypto exchanges, banking, or email.
  • Use content blockers (for example Malwarebytes Browser Guard) in Safari to reduce exposure to malicious content (though they are not a silver bullet for zero‑days).
  • Move high‑value crypto assets to hardware wallets or dedicated devices, and use mobile wallets only for smaller amounts.
  • Use a password manager with strong authentication, and turn on extra security settings like Face ID/Touch ID and avoid auto‑filling high‑risk credentials.
  • Enable multi-factor authentication (FIDO2 security keys or app‑based 2FA) on exchanges and financial accounts, so stolen passwords alone are not enough to plunder your accounts.
  • Regularly review app permissions and revoke access to sensitive data (Location, Photos, Contacts, Microphone, Camera, Health) revoke where unnecessary.

We don’t just report on phone security—we provide it

Cybersecurity risks should never spread beyond a headline. Keep threats off your mobile devices by downloading Malwarebytes for iOS, and Malwarebytes for Android today.

*** This is a Security Bloggers Network syndicated blog from Malwarebytes authored by Malwarebytes. Read the original post at: https://www.malwarebytes.com/blog/mobile/2026/03/a-darksword-hangs-over-unpatched-iphones


文章来源: https://securityboulevard.com/2026/03/a-darksword-hangs-over-unpatched-iphones/
如有侵权请联系:admin#unsafe.sh