Russian APT Star Blizzard Adopts DarkSword iOS Exploit Kit

Basically, a Russian hacking group is using a new tool to attack iPhones and steal information.
Star Blizzard, a Russian APT, is now using the DarkSword iOS exploit kit to target various sectors. This shift raises significant concerns for credential security and intelligence gathering. Organizations need to stay vigilant and enhance their defenses against these sophisticated attacks.
The Threat
Star Blizzard, a Russian state-sponsored hacking group, has recently adopted the DarkSword iOS exploit kit in its ongoing cyber campaigns. This APT, associated with the Russian intelligence service FSB, has been linked to various operations targeting sensitive sectors. The group has ramped up its activities, especially with an email campaign that uses Atlantic Council lures to deliver the GhostBlade malware. This marks a significant shift in their tactics, as they are now targeting Apple devices directly.
The campaign was first reported by Proofpoint, which noted a spike in malicious email volume on March 26, 2026. Unlike previous tactics that relied on malicious attachments, these emails contained links that redirected users to exploit kits. This change suggests a more sophisticated approach to bypass traditional security measures, as the emails were sent from multiple compromised addresses, increasing their chances of success.
Who's Behind It
Star Blizzard, also known by various aliases like Callisto and TA446, has a history of targeting government, financial, and educational sectors. The recent campaign shows their intent to expand their target set, now including iCloud accounts and Apple devices. This expansion indicates that the group is leveraging the DarkSword exploit kit for credential harvesting and intelligence collection, potentially after it was leaked on GitHub.
The group's association with the FSB highlights the geopolitical implications of their activities. By targeting high-profile institutions, they aim to gather sensitive information that could be used for espionage or other malicious purposes. The use of the DarkSword kit represents an evolution in their tactics, showcasing their adaptability and resourcefulness in the cyber landscape.
Tactics & Techniques
The DarkSword exploit kit is designed to exploit vulnerabilities in iOS devices, allowing attackers to gain unauthorized access. Proofpoint's analysis revealed that the exploit kit includes components for remote code execution (RCE) and PAC bypass, making it a potent tool for cybercriminals. The group has reportedly set up a domain specifically for serving the DarkSword kit, which includes various malicious components.
This new capability allows Star Blizzard to target a broader range of victims, as evidenced by their recent campaigns aimed at think tanks and legal entities. The shift to using links instead of attachments is a notable tactic that may help them evade detection by security systems.
Defensive Measures
Organizations should be aware of the growing threat posed by Star Blizzard and similar APT groups. To protect against such attacks, it is crucial to implement robust email filtering solutions and educate employees about recognizing phishing attempts. Regularly updating software and operating systems can also help mitigate the risk of exploitation.
Additionally, organizations should monitor for unusual activity related to their iCloud accounts and be prepared to respond quickly to any potential breaches. By staying informed about the latest threats and adopting proactive security measures, entities can better defend against the evolving tactics of state-sponsored hacking groups like Star Blizzard.