Coruna iOS Exploit - Update to Operation Triangulation
Basically, a new hacking tool targets iPhones using old vulnerabilities.
A new iOS exploit kit, Coruna, is targeting vulnerabilities previously used in Operation Triangulation. Millions of devices are at risk, especially those without recent updates. Stay vigilant and ensure your iOS is patched to avoid exploitation.
The Threat
The recently discovered Coruna iOS exploit kit has emerged as a significant threat in the cybersecurity landscape. This exploit kit is an updated version of a kernel exploit that was previously used in Operation Triangulation three years ago. According to Kaspersky, Coruna targets 23 vulnerabilities in iOS, including critical zero-day exploits like CVE-2023-32434 and CVE-2023-38606. These vulnerabilities were initially leveraged in high-profile attacks, indicating that Coruna is not just a minor update but a sophisticated tool for cyber-espionage.
Who's Behind It
The UNC6353 group, a Russian state-sponsored espionage entity, is reportedly using Coruna in its operations against Ukraine. This group has a history of employing advanced cyber techniques, and the use of Coruna signifies an escalation in their tactics. The exploit kit's design indicates that it was not hastily assembled; rather, it reflects a unified approach to exploitation, suggesting a high level of sophistication and intent.
Tactics & Techniques
Coruna's updated exploits feature enhanced capabilities, including more accurate version checking and compatibility with newer iOS iterations and Apple processors. This modular design allows for easy reuse by other threat actors, increasing the potential for widespread exploitation. Kaspersky warns that millions of users with unpatched devices are now at risk, as the exploit kit's reach extends to various iOS versions. The implications are severe, as the same framework could be adapted by lower-tier cybercriminals, further amplifying the threat landscape.
Defensive Measures
To protect against the risks posed by Coruna, users should ensure their iOS devices are updated with the latest security patches. Regularly checking for updates can mitigate the risk of exploitation. Additionally, users should be aware of the signs of potential compromise, such as unusual device behavior or unexpected messages. As cyber threats evolve, staying informed and proactive is essential for safeguarding personal and organizational data.
SecurityWeek