Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks
嗯,用户让我用中文总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读这篇文章,理解其主要内容和重点。 文章主要讲的是iPhone的安全问题。过去专家认为iOS系统很难被攻击,漏洞和零日漏洞很少。但最近Google、iVerify和Lookout的研究人员发现了一些大规模的网络攻击活动,使用了Coruna和DarkSword工具,这些工具几乎不加选择地攻击全球用户,尤其是那些没有更新到最新iOS版本的用户。 文章还提到这些工具已经泄露到网上,任何人都可以利用它们攻击旧版iOS用户。苹果公司为了提高安全性,引入了内存安全代码和锁定模式等功能,但仍有大量旧款iPhone容易受到攻击。 现在iPhone用户分为两类:运行最新iOS 26系统的用户有新的内存完整性保护功能;而运行旧版iOS的用户则容易受到基于内存的攻击。 总结一下,文章的核心是指出旧款iPhone存在安全漏洞,容易被新型工具攻击,而苹果的新措施只能保护部分用户。我需要把这些要点浓缩到100字以内,并且直接描述内容,不使用“文章总结”之类的开头。 可能的结构是:指出旧款iPhone易受攻击、新型工具的出现、苹果的新措施及其局限性。这样就能全面覆盖主要内容了。 </think> 文章指出,尽管苹果公司通过引入内存安全技术和锁定模式等措施提升了iPhone的安全性,但旧款iPhone仍易受基于内存的攻击工具(如Coruna和DarkSword)影响。这些工具被广泛用于针对未更新至最新系统的用户的网络间谍活动和大规模网络攻击。 2026-3-26 17:48:31 Author: techcrunch.com(查看原文) 阅读量:1 收藏

The common assumption among iPhone security experts has been that finding vulnerabilities and developing exploits for iOS was difficult, requiring a lot of time, resources, and teams of skilled researchers to break through its layers of security defenses. That meant iPhone spyware and zero-day vulnerabilities, which aren’t known to the software vendor before they are exploited, were rare and only used in limited and targeted attacks, as Apple itself says.

But in the last month, cybersecurity researchers at Google, iVerify, and Lookout have documented several broad-scale hacking campaigns using tools, known as Coruna and DarkSword, which have been near-indiscriminately targeting victims around the world who are not yet running Apple’s most up-to-date software. Some of the hackers behind these attacks include Russian spies and Chinese cybercriminals, and target their victims via hacked websites or fake pages, allowing them to potentially steal phone data from a large number of victims. 

Now, some of these tools have leaked online, allowing anyone to take the code and easily launch their own attacks against Apple users running older versions of iOS. 

Apple has invested significant resources in new security and development technologies, such as introducing memory-safe code for its latest iPhone models, and launching features like Lockdown Mode specifically to counter potential spyware attacks. The goal has been to make modern iPhones more secure, and to strengthen the claim that the iPhone is very hard to hack.

But there are still a lot of older, out-of-date iPhones that are now easier targets for spyware-wielding spies and cybercriminals. 

There are now essentially two security classes of iPhone users. 

Users on the latest iOS 26 running on the most recent iPhone 17 models released in 2025 have a new security feature called Memory Integrity Enforcement, which is designed to stop memory corruption bugs, some of the most commonly exploited flaws used in spyware and phone unlocking attacks. DarkSword relied heavily on memory corruption bugs, according to Google

Then, there are iPhone users who still run the previous version of Apple’s mobile software, iOS 18, or even older versions, which have been vulnerable to memory-based hacks and other exploits in the past. 

Contact Us

Do you have more information about DarkSword, Coruna, or other government hacking and spyware tools? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or by email.

The discovery of Coruna and DarkSword suggest that memory-based attacks could continue to plague users of older iPhones and iPads that lag behind the newer, more memory-safe models.

Experts working for iVerify and Lookout, two cybersecurity companies that have a commercial stake in selling security products for mobile devices, say Coruna and DarkSword may also challenge the long-held assumption that iPhone hacks are rare.

iVerify’s co-founder Matthias Frielingsdorf told TechCrunch that mobile attacks are now “widespread,” but he also said that attacks relying on zero-days against the most up-to-date software “will always be charged at a premium rate,” implying that these will not be used to hack people on a broad scale.

Patrick Wardle, an Apple security expert, said one problem is that people call attacks against iPhones rare or sophisticated just because they are seldom documented. But the reality, he said, is that these attacks may be out there but are not always caught. 

“Calling them ‘highly advanced’ is a bit like calling tanks or missiles advanced,” Wardle told TechCrunch. “It’s true, but it misses the point. That’s simply the baseline capability at that level, and all (most) nations have them (or can acquire them for the right price).”

Another problem highlighted by Coruna and DarkSword is that there is now an apparently thriving “second-hand” market, which creates the financial incentive “for exploit developers and individual brokers to essentially get paid twice for the same exploit,” according to Justin Albrecht, principal researcher at Lookout. 

Especially when the initial exploit gets patched, it makes sense for brokers to resell it before everyone updates. 

“This isn’t a one-time event, but rather a sign of things to come,” Albrecht told TechCrunch.

Lorenzo Franceschi-Bicchierai is a Senior Writer at TechCrunch, where he covers hacking, cybersecurity, surveillance, and privacy.

You can contact or verify outreach from Lorenzo by emailing [email protected], via encrypted message at +1 917 257 1382 on Signal, and @lorenzofb on Keybase/Telegram.

View Bio


文章来源: https://techcrunch.com/2026/03/26/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks/
如有侵权请联系:admin#unsafe.sh