DarkSword: the attack that left iPhones exposed and forced an urgent patch

Published 5 min de lectura 117 reading

Recently, the U.S. Infrastructure and Cybersecurity Agency (CISA) gave the order to federal agencies to urgently park three iOS vulnerabilities that were being exploited in campaigns aimed at cryptomoneda theft and cyberespionage. The instruction, which responds to a recent discovery of a mobile operating kit called DarkSword, requires the federal executive teams to apply the corrections in a very short time and puts the fragility of the devices back on the table when they are not kept up to date.

Researchers from different groups, including Google's threat intelligence team and independent specialists, have unravel that DarkSword is not an isolated failure but a complex chain of failures that, combined, allow an attacker to escape sandbox restrictions, scale privileges and run code remotely on ungrilled iPhones. The failures involved are recorded under several CVE identifications - including CVE-2025-31277, CVE-2025-43510 and CVE-2025-43520 - and Apple has already solved these problems in recent iOS versions. The notice of CISA is available with official details on its website: CISA alert on actively exploited vulnerabilities, and the entry in your known vulnerability catalogue is available here: vulnerability catalogue.

DarkSword: the attack that left iPhones exposed and forced an urgent patch
Image generated with IA.

What was DarkSword doing and why is it dangerous? DarkSword acts as a delivery framework: through a chain of exploits it takes advantage of operating system failures to enter a malicious load into the device. Analysis by several security firms has identified three malware families that arrived in these campaigns: an infostealer written in JavaScript with very aggressive behavior, a backdoor designed to exfilter large amounts of information and another JavaScript module that runs code and steals data. These parts, combined with the remote execution capacity of the explosion, make a vulnerable iPhone a direct source of private credentials, files and data.

A striking feature of the DarkSword kit is its operational intelligence: after obtaining and exfiltering the information, the explosion erases temporary traces and closes. This pattern suggests that it was designed for short-term surveillance operations and to make forensic detection difficult, rather than being latent on devices for long periods.

In addition to technical analyses, the investigations have drawn up links between the use of DarkSword and several threat groups. These include actors known to work with commercial surveillance providers and actors allegedly linked to intelligence services. The mobile security company Lookout, which identified and documented parts of the infrastructure and its relationship with another kit called Coruna, explains that campaigns seem to mix espionage and profit targets, including actors that could operate for state interests and financial-motivated actors. The Lookout report offers context and technical findings: analysis of DarkSword by Lookout.

A specific case observed by researchers involves watering- hole-type attacks: iPhones of users who were sailing through compromised Ukrainian websites - electronic shops, industrial equipment companies and local services - were redirected to receive exploits from both DarkSword and Coruna. These incidents identified the three mentioned malware families and the activity was traced to groups with internal names used by threat intelligence teams.

The response of CISA and the forced calendar the difference: CISA included three of the CVE used by DarkSword in its list of exploited vulnerabilities and, protected by the BOD 22-01 Linking Operational Directive, ordered federal agencies to remedy the failures within two weeks, with a deadline of April 3. The message is not just for the public sector. Although the directive only obliges federal agencies, CISA has made it clear that private organizations should also give priority to updating their fleets of devices to avoid similar incidents.

The CISA measure highlights a clear reality for IT administrators and users: when such exploits are known, the most effective remedy is to apply the manufacturer's updates. Apple has published patches that correct these vulnerabilities; keeping iOS up-to-date is primary defense. To review Apple security updates you can check your official page: Apple security updates.

DarkSword: the attack that left iPhones exposed and forced an urgent patch
Image generated with IA.

While the campaign that motivated the alert already has technical mitigation available in the most recent versions of the operating system, the lessons go beyond the spot patch. These incidents show how sophisticated operating chains combine technical engineering with deceiving tactics and vector choice (such as popular pointed sites) to maximize impact. They also show how the commercial surveillance ecosystem can intertwine with state and criminal actors, complicating attribution and posing risks to users worldwide.

What can companies and users do? The most powerful recommendation is simple: to update iPhones to the latest iOS version including corrections. Beyond that, organizations should review the navigation and content-blocking configuration, use detection of anomalies for traffic and unusual downloads, and validate that incident response practices include mobile device review. For an additional summary and media coverage of the alert and its implications, specialized media have published useful reports that contextualize the event: for example, technological publications that covered the action of CISA and the analysis of the operating kits.

In short, DarkSword is a reminder that phones, although closed and heavily controlled by their manufacturers, remain the target of advanced campaigns when there are unpatched failures. Update, audit and educate They remain the most effective tools to reduce risk to threats that combine technical exploitation and social engineering campaigns.

Coverage

Related

More news on the same subject.