• Home
  • Phones
  • A severe iPhone exploit is now public, and anyone can use it
Image

A severe iPhone exploit is now public, and anyone can use it


iPhone iOS18 Control Panel showing network controls

Dhruv Bhutani / Android Authority

TL;DR

  • DarkSword, a serious iPhone exploit kit, just leaked on GitHub.
  • If your device is running iOS 18.7.3 or earlier — or legacy versions 15.8.7 or 16.7.15 — you’re vulnerable.
  • Contacts, messages, call history, and your iOS keychain (Wi-Fi passwords and secrets) can be fully exfiltrated.

If you have an older iPhone or iPad with an outdated iOS version, check your settings as soon as possible. A serious exploit kit called DarkSword was just released on GitHub, and security experts warn that anyone can use it without special iOS knowledge.

TechCrunch reports that the exploit links weaknesses in WebKit and the iOS sandbox. What started as a complex spyware tool for targeted attacks quickly became something anyone can use with just a few clicks.

Last week, Google’s Threat Intelligence Group, alongside security firms iVerify and Lookout, revealed the existence of DarkSword and its counterpart, Coruna. These advanced hacking tools can fully compromise iPhones, stealing contacts, messages, call history, and even the iOS keychain with Wi-Fi passwords and other secrets.

Don’t want to miss the best from Android Authority?

google preferred source badge light@2xgoogle preferred source badge dark@2x

Now, a newer version of the exploit has been leaked on GitHub. Matthias Frielingsdorf, co-founder of iVerify, told TechCrunch, “This is bad. They are way too easy to repurpose.”

He explained that the leaked files are simple HTML and JavaScript. Anyone can put them on a server in minutes. The exploit works immediately on devices with older operating systems.

If your iPhone is running iOS 18.7.3 or earlier, or if you have an older device stuck on iOS 15.8.7 or 16.7.15, your device is at risk. According to Apple, about a quarter of all active iPhones and iPads — hundreds of millions — are still using these vulnerable versions.

The exploit mainly targets devices running iOS 18.4 to 18.7, but it also affects older versions. If you visit a malicious site in Safari, the exploit can break through security layers and let attackers steal your data. The leaked code even includes instructions for taking and uploading your information.

Apple has already taken action. Earlier this month, the company released emergency security updates for iOS 26.3, iOS 18.7.3, and special updates for older devices that cannot run iOS 26.

If you’re on a device that supports iOS 26, you need to be on iOS 26.3 or newer. If you’re on an older device that stopped at iOS 15 or 16, make sure you’ve grabbed the final security updates Apple pushed out specifically to block this exploit.

If you are a high-risk user, such as a journalist, activist, or executive, Apple says turning on Lockdown Mode will block this attack and give you extra protection while you update your device.

Thank you for being part of our community. Read our Comment Policy before posting.



Source link

Releated Posts

I can’t wait for Google Messages to get these 3 big new RCS features

It has taken a long time for RCS to unify the messaging experience across Android devices first, then…

ByByTDSNEWS999 Mar 28, 2026

I tested UGREEN’s 17-in-1 Maxidok, and it is the best Thunderbolt 5 dock around — it even gets an unbelievable launch discount

I used UGREEN’s Thunderbolt 4-based Revodok Max 213 dock on my desk for the better part of two…

ByByTDSNEWS999 Mar 28, 2026

Android 17 Beta 3 finally brings the desktop multitasking we’ve been waiting for

What you need to know Android 17 Beta 3 finally delivers on its multitasking promise after earlier betas…

ByByTDSNEWS999 Mar 28, 2026

These are my tech EDC essentials — and they’re discounted right now

As someone who tests gadgets, I have plenty of tech gear on hand. That list includes latest foldables…

ByByTDSNEWS999 Mar 28, 2026