By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Online Tech Guru
  • News
  • PC/Windows
  • Mobile
  • Apps
  • Gadgets
  • More
    • Gaming
    • Accessories
    • Editor’s Choice
    • Press Release
Reading: Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild
Best Deal
Font ResizerAa
Online Tech GuruOnline Tech Guru
  • News
  • Mobile
  • PC/Windows
  • Gaming
  • Apps
  • Gadgets
  • Accessories
Search
  • News
  • PC/Windows
  • Mobile
  • Apps
  • Gadgets
  • More
    • Gaming
    • Accessories
    • Editor’s Choice
    • Press Release
“The player base never disappeared; they just didn’t have anything to play” – Echo Foundry on reviving the rhythm game genre

“The player base never disappeared; they just didn’t have anything to play” – Echo Foundry on reviving the rhythm game genre

News Room News Room 18 March 2026
FacebookLike
InstagramFollow
YoutubeSubscribe
TiktokFollow
  • Subscribe
  • Privacy Policy
  • Contact
  • Terms of Use
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Online Tech Guru > News > Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild
News

Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild

News Room
Last updated: 18 March 2026 14:26
By News Room 5 Min Read
Share
Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild
SHARE

iPhone hacking techniques have sometimes been described almost like rare and elusive animals: Hackers have used them so stealthily and carefully against such a small number of hand-picked targets that they’re only rarely seen in the wild. Now a recent spate of espionage and cybercriminal campaigns has instead deployed those same phone-takeover tools, embedded in infected websites, to indiscriminately hack phones by the thousands. And one new technique in particular—capable of taking over any of hundreds of millions of iOS devices—has appeared on the web in an easily reusable form, putting a significant fraction of the world’s iPhone users at risk.

Researchers at Google and cybersecurity firms iVerify and Lookout on Wednesday jointly revealed the discovery of a sophisticated iPhone hacking technique known as DarkSword that they’ve seen in use on infected websites, capable of instantly and silently hacking iOS devices that visit those sites. While the technique doesn’t affect the latest, updated versions of iOS, it does work against iOS devices running versions of Apple’s previous operating system release, iOS 18, which as of last month still accounted for close to a quarter of iPhones, according to Apple’s own count.

“A vast number of iOS users could have all of their personal data stolen simply for visiting a popular website,” says Rocky Cole, iVerify’s cofounder and CEO. “Hundreds of millions of people who are still using older Apple devices or older operating system versions remain vulnerable.”

The iPhone-hacking campaign that used DarkSword has come to light just two weeks after the revelation of another, even more sophisticated and fully featured hacking toolkit known as Coruna was found in use by what Google describes as a Russian state-sponsored espionage group and other hacker groups. Although DarkSword appears to have been created by different developers from Coruna, the researchers found that it was used by those same Russian spies. Like Coruna, it too was embedded in components of otherwise legitimate Ukrainian websites, including online news outlets and a government agency site, to harvest data from visitors’ phones.

Yet just as concerning, says iVerify cofounder and researcher Matthias Frielingsdorf, is that the hackers who carried out that espionage campaign left the full, unobscured DarkSword code—complete with explanatory comments in English that describe each component and include the “DarkSword” name for the tool—available on those sites for anyone to access and reuse. That carelessness, he says, practically invites other hacker groups to adopt it and target other iPhone users. “Anyone who manually grabbed all the different parts of the exploit could put them onto their own web server and start infecting phones. It’s as simple as that,” says Frielingsdorf. “It’s all nicely documented, also. It’s really too easy.”

WIRED reached out to Apple for comment on the researchers’ findings, but the company didn’t provide comment. Google declined to comment beyond the blog post it released about its DarkSword findings.

According to Lookout, DarkSword is designed to steal data from vulnerable iPhones that include passwords and photos; logs from iMessage, WhatsApp, and Telegram; browser history; Calendar and Notes data; and even data from Apple’s Health app. Despite the apparent espionage focus of the hacking campaign, DarkSword also steals users’ cryptocurrency wallet credentials, suggesting the hackers may have carried out a possible side business in for-profit cybercrime.

Rather than install spyware that persists on users’ phones, DarkSword uses stealthier techniques that are more often seen in “fileless” malware that typically target Windows devices, hijacking the legitimate processes in an iPhone’s operating system to steal data. “Instead of using a spyware payload to brute force your way through the file system—which leaves tons of artifacts of exploitation that are pretty easy to detect—this just uses system processes the way they’re meant to be used,” iVerify’s Cole says. “And it leaves far fewer traces.”

Share This Article
Facebook Twitter Copy Link
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Oh, you think the government will regulate Kalshi and Polymarket? Wanna bet?

Oh, you think the government will regulate Kalshi and Polymarket? Wanna bet?

News Room News Room 18 March 2026
FacebookLike
InstagramFollow
YoutubeSubscribe
TiktokFollow

Trending

DLSS 5: Has Nvidia’s AI graphics technology gone too far?

Nvidia has revealed a new “3D guided neural rendering model” called DLSS 5 that can…

18 March 2026

Marathon’s Time To Kill Is Unforgiving, Unfair, and Utterly Brilliant

I left Marathon's pre-release server slam convinced that I was dying too quickly, and that…

18 March 2026

Humanscale’s New $15K Lounge Chair Is the Ultimate Home Office Workstation

The chair starts at $8,995, but that doesn't include the side table or ottoman. Add…

18 March 2026
News

Confessions of the ICE Agent Whisperer

Confessions of the ICE Agent Whisperer

As immigration became one of the defining focuses of Donald Trump’s second administration, the Department of Homeland Security (DHS) has taken center stage. Under the 2025 One Big Beautiful Bill…

News Room 18 March 2026

Your may also like!

Nvidia has lost the plot with gamers
News

Nvidia has lost the plot with gamers

News Room 18 March 2026
Nvidia CEO says critics are “completely wrong” about DLSS 5 technology
Gaming

Nvidia CEO says critics are “completely wrong” about DLSS 5 technology

News Room 18 March 2026
The Best Folding Phones
News

The Best Folding Phones

News Room 18 March 2026
Boroux Versus Rorra Countertop Water Filters, Tested Head to Head
News

Boroux Versus Rorra Countertop Water Filters, Tested Head to Head

News Room 18 March 2026

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site.

Read our privacy policy for more information.

Quick Links

  • Subscribe
  • Privacy Policy
  • Contact
  • Terms of Use
Advertise with us

Socials

Follow US
Welcome Back!

Sign in to your account

Lost your password?