TA446 Hackers Deploy DarkSword Exploit Kit Against iOS Users

Basically, a hacker group is using a new tool to attack iPhones and steal information.
TA446 has launched a new campaign using the DarkSword exploit kit to target iOS users. This shift in tactics raises concerns about credential theft. Users are urged to stay vigilant against suspicious emails and keep their devices updated.
The Threat
A known threat group, TA446, has recently been caught deploying a new exploit kit called DarkSword to target iOS users. This marks a significant shift in their tactics, as previous activities showed no signs of using exploit kits. The campaign came to light around March 26, 2026, when researchers observed the group spoofing the Atlantic Council to lure victims into clicking malicious links. This clever disguise demonstrates the lengths to which TA446 will go to make their attacks appear legitimate.
The DarkSword exploit kit is designed with multiple components, including an initial redirector, an exploit loader, a remote code execution (RCE) component, and a Proxy Auto-Configuration (PAC) bypass module. These parts work together seamlessly, allowing attackers to guide victims through the exploit chain without raising suspicion. Although the kit is known for its sandbox escape capabilities, researchers did not observe these features during their analysis.
Who's Behind It
TA446 is a well-known threat actor group that has been active in various cyber campaigns. Their recent use of DarkSword indicates a shift towards more sophisticated methods, particularly in targeting iOS users. The group's email campaigns have expanded significantly, suggesting they are broadening their reach to collect credentials and intelligence from a larger pool of victims.
The use of a high-profile organization like the Atlantic Council as a cover adds credibility to their attacks, making it easier for them to deceive potential targets. This organized approach reflects a growing sophistication in TA446's operational tactics, as they adapt to new opportunities in the cybersecurity landscape.
Tactics & Techniques
DarkSword operates as a multi-component attack chain rather than a standalone tool. Once a target clicks a malicious link, the initial redirector quietly guides the victim's device through a series of steps. The exploit loader assesses the device and loads the appropriate exploit for the iOS environment. This modular design allows the kit to be flexible and difficult to shut down, as each component can be updated independently.
One notable feature is the PAC bypass component, which enables attackers to redirect network traffic through attacker-controlled proxy settings. This allows TA446 to intercept sensitive data, such as login credentials, without needing persistent malware on the device. Combined with the RCE component, the kit provides significant control over a compromised iOS device during an active session.
Defensive Measures
Organizations and individuals must be vigilant to protect themselves from these types of attacks. Here are some recommended actions:
- Avoid clicking links in unexpected emails, even if they appear to come from trusted sources.
- Keep iOS devices updated to the latest version to reduce exposure to known exploits.
- Monitor network traffic for unexpected proxy configurations, which could indicate PAC bypass activity.
- Block known malicious domains associated with this campaign at the network level to prevent access to the exploit kit.
By taking these steps, users can better defend against the evolving tactics of groups like TA446 and mitigate the risks associated with the DarkSword exploit kit.