Coruna: A very powerful iOS exploit kit

Coruna: A very powerful iOS exploit kit

Google’s Threat Intelligence Group (GTIG) has uncovered a massive new iOS exploit kit dubbed “Coruna”. The malware targets Apple iPhone models running iOS 13.0 through to iOS 17.2.1, Coruna is a formidable threat armed with 23 distinct exploits and five complete exploit chains.

A Timeline of Proliferation

  • February 2025: GTIG first identified fragments of the exploit chain being utilised in highly targeted operations by a customer of a commercial surveillance vendor (The malware is widely believed to have been developed for the US government). The exploits were wrapped in a unique JavaScript framework designed to fingerprint devices.
  • Summer 2025: The kit then resurfaced in the hands of UNC6353, a suspected Russian espionage group. They deployed Coruna in watering hole attacks targeting Ukrainian users, hiding the malicious framework within compromised local websites ranging from retail tools to industrial equipment.
  • Late 2025: Finally, the complete exploit kit was acquired by UNC6691, a financially motivated threat actor operating out of China. This group deployed Coruna on a massive scale, using hidden iFrames injected into fake cryptocurrency exchange websites to trap unsuspecting victims.

Under the Bonnet

The framework driving Coruna is exceptionally well-engineered. When a user visits a compromised site, the kit actively fingerprints the device and will immediately halt the attack if it detects the user is in Private Browsing mode or is using Apple’s Lockdown mode.

If the device is vulnerable, the malware delivers unencrypted Remote Code Execution (RCE) and Pointer Authentication Code (PAC) bypasses. It then deploys a binary loader that pulls down heavily obfuscated payloads that are encrypted with the ChaCha20 encryption algorithm. The malware is compressed and tailored specifically to the target’s iOS version and internal chipset. Notably, the threat actors utilised powerful vulnerabilities, including CVE-2024-23222, a zero-day vulnerability which was patched by Apple in January 2024.

As mentioned above, the malware utilises 23 exploits to bypass device security, evade discovery, elevate privilege levels, and maintain persistence

TypeCodenameTargeted versions (inclusive)Fixed versionCVE
WebContent R/Wbuffout13 → 15.1.115.2CVE-2021-30952
WebContent R/Wjacurutu15.2 → 15.515.6CVE-2022-48503
WebContent R/Wbluebird15.6 → 16.1.216.2No CVE
WebContent R/Wterrorbird16.2 → 16.5.116.6CVE-2023-43000
WebContent R/Wcassowary16.6 → 17.2.116.7.5, 17.3CVE-2024-23222
WebContent PAC bypassbreezy13 → 14.x?No CVE
WebContent PAC bypassbreezy1515 → 16.2?No CVE
WebContent PAC bypassseedbell16.3 → 16.5.1?No CVE
WebContent PAC bypassseedbell_16_616.6 → 16.7.12?No CVE
WebContent PAC bypassseedbell_1717 → 17.2.1?No CVE
WebContent sandbox escapeIronLoader16.0 → 16.3.116.4.0 (<= A12)15.7.8, 16.5CVE-2023-32409
WebContent sandbox escapeNeuronLoader16.4.0 → 16.6.1 (A13-A16)17.0No CVE
PENeutron13.X14.2CVE-2020-27932
PE (infoleak)Dynamo13.X14.2CVE-2020-27950
PEPendulum14 → 14.4.x14.7No CVE
PEPhoton14.5 → 15.7.615.7.7, 16.5.1CVE-2023-32434
PEParallax16.4 → 16.717.0CVE-2023-41974
PEGruber15.2 → 17.2.116.7.6, 17.3No CVE
PPL BypassQuark13.X14.5No CVE
PPL BypassGallium14.x15.7.8, 16.6CVE-2023-38606
PPL BypassCarbone15.0 → 16.7.617.0No CVE
PPL BypassSparrow17.0 → 17.316.7.6, 17.4CVE-2024-23225
PPL BypassRocket17.1 → 17.416.7.8, 17.5CVE-2024-23296

Despite its origins in the surveillance sector, Coruna’s final payload is strictly financial. Tracked by GTIG as PLASMAGRID, the stager binary injects itself into a root-level iOS daemon with its primary goal being cryptocurrency theft.

The payload is capable of decoding QR codes from saved images and scanning Apple Memos for word sequences or specific keywords like “bank account” and “backup phrase”. The malware also remotely downloads modules designed specifically to hook into and exfiltrate data from popular crypto wallets, including MetaMask, Trust Wallet, and Exodus.

According to GTIG, the developers of the malware left behind internal logs written in Chinese, with some code comments featuring emojis and syntax suggesting they may have been generated by an LLM. The malware also uses a custom domain generation algorithm (DGA) seeded with the word “lazarus” as a fallback mechanism to maintain contact with its command and control servers.

How to Protect Your Device

Google has shared its research to raise industry awareness and has already added all identified malicious domains to Safe Browsing to safeguard users.

Because the Coruna exploit kit relies on older vulnerabilities and is not effective against the latest Apple software, the absolute most effective defence is to update your iPhone to the latest version of iOS. For those users who are unable to update their devices for any reason, enabling Apple’s Lockdown Mode is strongly recommended, as the exploit kit is programmed to automatically bail out when this enhanced security feature is active.