VulnerabilitiesHIGH

iOS 26 Security - Leaked Tools Expose Millions to Spyware

TCTechCrunch Security
iOS 26CorunaDarkSwordApplespyware
🎯

Basically, leaked hacking tools make it easier for hackers to attack older iPhones.

Quick Summary

Leaked hacking tools put millions of older iPhones at risk. Cybersecurity experts warn that outdated devices are vulnerable to spyware attacks. Users must update their software to stay safe.

The Flaw

In recent weeks, cybersecurity experts have uncovered serious vulnerabilities affecting millions of older iPhones. The tools, known as Coruna and DarkSword, have leaked online, allowing anyone to exploit weaknesses in outdated versions of iOS. While Apple has made significant strides in securing its latest iOS 26, many users remain on older versions, making them prime targets for spyware attacks.

These leaked tools are particularly concerning because they enable hackers, including state-sponsored actors from Russia and China, to launch widespread attacks. Previously, exploiting iOS was considered a complex task, but the availability of these tools has changed the landscape, making it easier for malicious actors to target unsuspecting users.

What's at Risk

The primary risk lies in the fact that many iPhone users are still operating on older software versions, such as iOS 18. These outdated systems lack the advanced security features introduced in iOS 26, such as Memory Integrity Enforcement, which protects against common memory corruption bugs. As a result, users of older devices are significantly more vulnerable to attacks that can steal personal data and compromise device security.

Experts have noted that the emergence of these hacking tools challenges the long-held belief that iPhone attacks are rare. With the right tools now available, the potential for widespread mobile attacks has increased dramatically, impacting millions who may not even be aware of the risks.

Patch Status

Apple has been proactive in enhancing the security of its devices, particularly with the introduction of new features in iOS 26. However, the reality is that many users are slow to adopt updates, leaving them exposed to these vulnerabilities. The company has rolled out patches for known exploits, but the challenge remains in convincing users to upgrade their devices.

The ongoing existence of a second-hand market for exploits means that even patched vulnerabilities can be resold and reused against unpatched systems. This creates a cycle where outdated devices remain vulnerable long after a fix has been issued, as exploit developers capitalize on the delay in user updates.

Immediate Actions

For iPhone users, the most critical step is to ensure that their devices are updated to the latest version of iOS. Users should regularly check for updates and enable automatic updates to minimize their exposure to vulnerabilities. Additionally, being cautious about the websites visited and the links clicked can help mitigate the risk of falling victim to these attacks.

Cybersecurity experts recommend that users familiarize themselves with the signs of spyware infection, such as unusual battery drain or unexpected data usage. By staying informed and proactive, users can better protect themselves against the growing threat of spyware and other cyberattacks targeting older iPhones.

🔒 Pro insight: The proliferation of leaked hacking tools signifies a shift in the threat landscape, making outdated iOS devices prime targets for widespread exploitation.

Original article from

TechCrunch Security · Lorenzo Franceschi-Bicchierai

Read Full Article

Related Pings

CRITICALVulnerabilities

CVE-2026-33634 - Critical Vulnerability Added to CISA Catalog

CISA has added a new critical vulnerability to its KEV Catalog. CVE-2026-33634 affects Aqua Security's Trivy, posing risks to federal networks. Organizations must act quickly to mitigate potential threats.

CISA Advisories·
HIGHVulnerabilities

Vulnerabilities in AI-Generated Code - Researchers Warn

Researchers at Georgia Tech have found a sharp rise in vulnerabilities linked to AI-generated code. This surge in CVEs raises serious concerns for software security. Developers must be vigilant as AI tools become more prevalent in coding practices.

Infosecurity Magazine·
CRITICALVulnerabilities

Langflow Vulnerability - CISA Warns of Critical Code Injection

CISA has flagged a critical code injection vulnerability in Langflow, tracked as CVE-2026-33017. This flaw allows attackers to exploit the platform without authentication. Organizations must act quickly to apply patches or discontinue use to avoid serious risks.

Cyber Security News·
HIGHVulnerabilities

Vulnerability in OpenCode Systems - Access SMS Messages

A vulnerability in OpenCode Systems' messaging products allows unauthorized access to SMS messages. This affects users of version 6.32.2, posing serious privacy risks. Immediate updates are recommended to mitigate the threat.

CISA Advisories·
CRITICALVulnerabilities

PTC Windchill - Critical Remote Code Execution Vulnerability

A critical vulnerability in PTC Windchill could allow attackers to execute code remotely. Affected versions include several Windchill and FlexPLM releases. Immediate action is essential to protect systems from exploitation.

CISA Advisories·
HIGHVulnerabilities

IDrive Vulnerability - Attackers Can Escalate Privileges

A critical vulnerability in IDrive for Windows allows attackers to escalate privileges. This flaw affects users of versions 7.0.0.63 and earlier, putting their systems at risk. Immediate action is necessary until a patch is released.

Cyber Security News·