Malware & RansomwareHIGH

Malware - New Darksword iOS Exploit Targets Personal Data

BCBleepingComputer
🎯

Basically, a new malware called Darksword is stealing personal information from iPhones.

Quick Summary

A new malware called Darksword is targeting iPhones, stealing sensitive personal data, including cryptocurrency wallet information. Users must update their iOS immediately to protect themselves.

What Happened

A sophisticated new exploit kit called Darksword has emerged, specifically targeting iPhones running iOS versions 18.4 through 18.6.2. This malware is linked to a threat actor known as UNC6353, likely based in Russia, who previously used the Coruna exploit chain. Researchers from Lookout Threat Labs discovered Darksword while investigating the infrastructure behind Coruna attacks. They found that Darksword uses multiple known vulnerabilities to gain unauthorized access to personal data.

The exploit kit employs a 1-click delivery method that begins in the Safari browser. Once a user visits a compromised website, Darksword executes a series of exploits to obtain kernel read/write access. This allows the malware to inject malicious code into privileged iOS services, enabling it to steal sensitive information.

Who's Being Targeted

Darksword primarily targets iPhone users, particularly those who have not updated their devices to the latest iOS version. The malware is designed to steal a wide range of personal information, including:

  • Saved passwords
  • Photos (including hidden images)
  • Cryptocurrency wallet data (from apps like Coinbase and Binance)
  • Text messages and call history
  • Location history

The threat actors behind Darksword are well-funded and have access to various exploits, making them a significant threat to users who may not be aware of the risks.

Signs of Infection

Users may not notice any immediate signs of infection, but there are some indicators to watch for. If your device behaves unusually, such as experiencing slow performance or unexpected app crashes, it could be a sign of malware activity. Additionally, if you notice unauthorized transactions in your cryptocurrency accounts or changes to your saved passwords, it’s crucial to investigate further.

Darksword is designed to wipe temporary files after exfiltrating data, making it harder for users to detect its presence. This stealthy approach is typical of sophisticated malware, which aims to remain undetected while it operates.

How to Protect Yourself

To protect against Darksword, users are strongly advised to upgrade to the latest iOS version, iOS 26.3.1, which includes critical security patches. Enabling Lockdown Mode can also provide an additional layer of security for those at high risk of being targeted.

For users with older devices that cannot be updated, it is recommended to monitor accounts closely and change passwords regularly. Additionally, consider using two-factor authentication for sensitive accounts, especially those related to cryptocurrency. Staying informed about the latest threats and maintaining good security hygiene can significantly reduce the risk of falling victim to malware like Darksword.

🔒 Pro insight: The Darksword exploit kit's sophistication indicates a shift in malware development, emphasizing the need for advanced detection methods.

Original article from

BleepingComputer · Bill Toulas

Read Full Article

Related Pings

HIGHMalware & Ransomware

Ransomware - Marquis Reports Data Theft of 672K Individuals

Marquis, a Texas financial services firm, suffered a ransomware attack affecting over 670,000 individuals. The breach compromised sensitive personal data, raising serious security concerns. Affected individuals should monitor their accounts closely and take protective measures.

BleepingComputer·
HIGHMalware & Ransomware

Malware - New Campaigns Turn Devices Into DDoS and Mining Bots

New malware campaigns are hijacking network devices for DDoS attacks and crypto-mining. Routers and IoT devices are at risk, making immediate action essential. Protect your infrastructure to avoid exploitation.

Cyber Security News·
HIGHMalware & Ransomware

Malware - Iranian Hackers Used Stolen Credentials in Stryker Breach

A significant cyberattack on Stryker by Iranian hackers has disrupted operations globally. The attackers exploited stolen credentials, raising serious security concerns. Stryker is working to restore affected systems while authorities investigate the breach.

SecurityWeek·
HIGHMalware & Ransomware

Vidar Stealer 2.0 - Malware Delivered via Fake Game Cheats

A new malware campaign is exploiting fake game cheats on GitHub and Reddit to deliver Vidar 2.0. Gamers are at risk as they unknowingly install this dangerous infostealer. Stay informed and protect your data from these evolving threats.

Infosecurity Magazine·
HIGHMalware & Ransomware

Malware - GlassWorm Campaign Targets Python Repos via GitHub

A new malware campaign, ForceMemo, is targeting Python repositories on GitHub using stolen developer tokens. This poses a significant risk to developers and users alike. Vigilance is crucial to prevent compromise.

SC Media·
HIGHMalware & Ransomware

GlassWorm Malware - Major Attack Hits GitHub and npm Repos

A new wave of GlassWorm malware has compromised over 400 code repositories on GitHub and npm. Developers are at risk of losing sensitive data. Stay vigilant and check for signs of infection to protect your projects.

BleepingComputer·