Connect with us

Security

Urgent Alert: CISA Urges Immediate Patching for iOS Vulnerabilities Linked to Crypto Theft

Published

on

The Cybersecurity and Infrastructure Security Agency (CISA) in the United States has directed federal agencies to address three critical iOS security vulnerabilities that have been exploited in cyberespionage and crypto-theft attacks using the Coruna exploit kit.

Recent findings by the Google Threat Intelligence Group (GTIG) have uncovered that the Coruna exploit kit employs various exploit chains to target a total of 23 iOS vulnerabilities, with many of them being leveraged in zero-day attacks.

It is important to note that these exploits are ineffective on newer iOS versions and are thwarted if the target is utilizing private browsing or has activated Apple’s Lockdown Mode anti-spyware feature.

The Coruna exploit kit equips threat actors with capabilities such as Pointer Authentication Code (PAC) bypass, sandbox escape, and PPL (Page Protection Layer) bypass, allowing them to achieve WebKit remote code execution and elevate permissions to Kernel privileges on vulnerable devices.

GTIG has observed multiple threat actors utilizing the exploit kit, including a customer of a surveillance vendor, a suspected state-backed hacking group from Russia (UNC6353), and a financially motivated threat actor from China (UNC6691).

The latter group deployed the kit on fraudulent gambling and cryptocurrency websites to distribute a malware payload aimed at stealing the cryptocurrency wallets of infected victims.

Coruna attacks timeline
Coruna attacks timeline (GTIG)

iVerify, a mobile security firm, has characterized Coruna as an example of “sophisticated spyware-grade capabilities” that have transitioned “from commercial surveillance vendors to nation-state actors and, ultimately, mass-scale criminal operations.”

In response to these threats, CISA has identified three of the 23 Coruna vulnerabilities as Known Exploited Vulnerabilities and has instructed Federal Civilian Executive Branch (FCEB) agencies to secure their devices by March 26, following the directives of Binding Operational Directive (BOD) 22-01.

See also  Securing the Future: A Guide for Security Leaders in Response to Anthropic's Claude Code Vulnerabilities

CISA emphasized the importance of implementing mitigations as per the vendor’s instructions, adhering to BOD 22-01 guidance for cloud services, or discontinuing product usage if mitigations are unavailable to combat these vulnerabilities effectively.

Given that such vulnerabilities are commonly exploited by malicious cyber actors and pose significant risks to the federal enterprise, CISA has urged all organizations, including private sector entities, to prioritize the patching of these flaws to enhance device security against potential attacks promptly.

tines

Malicious software is becoming increasingly sophisticated. The Red Report 2026 details how emerging threats leverage mathematical techniques to evade sandboxes and remain undetected.

Access our analysis of over 1.1 million malicious samples to identify the top 10 tactics and assess the effectiveness of your security measures.

Trending