Key Takeaways
- Google’s researchers expose Coruna, a sophisticated exploit framework aimed at iPhone users.
- The exploit targets iOS versions 13 through 17.2.1 via WebKit vulnerabilities and device fingerprinting.
- Multiple threat groups deploy the same exploit toolkit for espionage and financially-motivated attacks.
- The malware specifically searches for cryptocurrency wallet data, QR codes, and banking credentials.
- Apple device owners should immediately update iOS or activate Lockdown Mode for enhanced security.
Security researchers at Google have discovered an advanced exploit framework targeting Apple’s iPhone devices across a wide range of operating system versions from iOS 13 to iOS 17.2.1. According to Google’s Threat Intelligence Group, cybercriminals have weaponized this exploit toolkit to extract cryptocurrency wallet information and other sensitive financial data from compromised devices. The search giant also revealed that various threat actors now utilize this framework for both state-sponsored surveillance and financially-motivated cybercrime operations.
Security researchers trace Coruna exploit distribution among cybercriminal networks
The discovery of the Coruna exploit toolkit emerged from Google’s Threat Intelligence Group investigations into targeted digital surveillance activities conducted in early 2025. Security analysts identified attackers leveraging a specialized JavaScript-based framework engineered to profile and fingerprint iPhone devices. This sophisticated profiling system determines specific device models and installed iOS versions before launching customized exploitation sequences.
Google’s investigation subsequently revealed connections between this exploit infrastructure and watering-hole style attacks directed at Ukrainian internet users. The attack code was embedded within compromised legitimate websites, deploying through concealed iFrames that triggered specifically when visitors accessed the sites using iPhones. Security researchers attributed these intrusion attempts to UNC6353, a cyber-espionage entity believed to have Russian state connections.
Further analysis by Google uncovered the identical exploit toolkit operating across extensive networks of deceptive Chinese financial platforms. These fraudulent websites masqueraded as legitimate cryptocurrency exchange services and online gambling platforms to attract potential victims. Google’s researchers determined that cybercriminals with financial motivations subsequently adapted the toolkit for broader criminal enterprises.
Technical examination reveals sophisticated multi-stage attack methodology
According to Google’s technical analysis, the Coruna framework encompasses five complete exploitation chains incorporating twenty-three distinct security vulnerabilities. This toolkit possesses the capability to compromise iPhone devices operating any system version spanning iOS 13 through iOS 17.2.1. Security analysts verified that threat actors exploited multiple WebKit rendering engine vulnerabilities to achieve arbitrary code execution on victim devices.
The exploitation framework incorporates advanced techniques designed to circumvent security mechanisms including pointer authentication codes and other memory protection systems. Following successful initial compromise, attackers deploy encrypted binary payloads engineered to inject additional malicious components directly into the iOS operating environment. Google‘s security team documented the implementation of a specialized code loader that infiltrates iOS power management system processes.
Researchers at Google also determined that the exploit framework actively avoids targeting devices with Lockdown Mode enabled or those operating in private browsing configurations. The toolkit employs sophisticated device fingerprinting methods to verify authentic iPhone hardware before proceeding with exploitation attempts. Google’s comprehensive analysis demonstrated that threat actors meticulously engineered the framework to deliver optimized exploit sequences tailored to each specific device configuration.
Malware payload specifically engineered to harvest cryptocurrency credentials
Google’s malware analysis team discovered that the ultimate payload delivered through this exploitation framework concentrates exclusively on extracting financial information stored within compromised devices. The malicious code systematically scans file systems and image galleries searching for cryptocurrency wallet recovery phrases and banking credential references. Security researchers reported that the malware specifically searches for BIP39 mnemonic seed phrases and associated wallet backup terminology.
The malicious payload includes image analysis capabilities designed to identify QR codes containing cryptocurrency wallet addresses and private keys. Once the malware identifies sensitive financial data, it exfiltrates the information to remote command-and-control infrastructure operated by the attackers. Google’s analysts documented that the malware additionally scans Apple Notes application data searching for text strings related to financial accounts or cryptographic recovery keys.
Google has verified that current iOS releases have addressed the vulnerabilities exploited by this toolkit, rendering it ineffective against updated devices. Nevertheless, Google strongly advises all iPhone users to immediately install the latest available iOS updates if their devices remain on older operating system versions. The company further recommends activating Lockdown Mode as an interim protective measure when immediate system updates prove unfeasible, significantly reducing vulnerability to this and similar exploitation frameworks.





