Technologist Mag
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On
20% Off LG Promo Code & Coupons | May 2026

20% Off LG Promo Code & Coupons | May 2026

13 May 2026
Apple iPhone’s Camera app could finally stop treating everyone like a beginner

Apple iPhone’s Camera app could finally stop treating everyone like a beginner

13 May 2026
H&R Block Coupon: 25% Off DIY + Tax Pro Assist

H&R Block Coupon: 25% Off DIY + Tax Pro Assist

13 May 2026
Your Android phone is about to get much better at blocking scams

Your Android phone is about to get much better at blocking scams

13 May 2026
Ready or Not, “Embodied AI” Is Leaving the Lab and Entering Infrastructure

Ready or Not, “Embodied AI” Is Leaving the Lab and Entering Infrastructure

13 May 2026
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Technologist Mag
SUBSCRIBE
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release
Technologist Mag
Home » Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild
Tech News

Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild

By technologistmag.com18 March 20264 Mins Read
Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild
Share
Facebook Twitter Reddit Telegram Pinterest Email

iPhone hacking techniques have sometimes been described almost like rare and elusive animals: Hackers have used them so stealthily and carefully against such a small number of hand-picked targets that they’re only rarely seen in the wild. Now a recent spate of espionage and cybercriminal campaigns has instead deployed those same phone-takeover tools, embedded in infected websites, to indiscriminately hack phones by the thousands. And one new technique in particular—capable of taking over any of hundreds of millions of iOS devices—has appeared on the web in an easily reusable form, putting a significant fraction of the world’s iPhone users at risk.

Researchers at Google and cybersecurity firms iVerify and Lookout on Wednesday jointly revealed the discovery of a sophisticated iPhone hacking technique known as DarkSword that they’ve seen in use on infected websites, capable of instantly and silently hacking iOS devices that visit those sites. While the technique doesn’t affect the latest, updated versions of iOS, it does work against iOS devices running versions of Apple’s previous operating system release, iOS 18, which as of last month still accounted for close to a quarter of iPhones, according to Apple’s own count.

“A vast number of iOS users could have all of their personal data stolen simply for visiting a popular website,” says Rocky Cole, iVerify’s cofounder and CEO. “Hundreds of millions of people who are still using older Apple devices or older operating system versions remain vulnerable.”

The iPhone-hacking campaign that used DarkSword has come to light just two weeks after the revelation of another, even more sophisticated and fully featured hacking toolkit known as Coruna was found in use by what Google describes as a Russian state-sponsored espionage group and other hacker groups. Although DarkSword appears to have been created by different developers from Coruna, the researchers found that it was used by those same Russian spies. Like Coruna, it too was embedded in components of otherwise legitimate Ukrainian websites, including online news outlets and a government agency site, to harvest data from visitors’ phones.

Yet just as concerning, says iVerify cofounder and researcher Matthias Frielingsdorf, is that the hackers who carried out that espionage campaign left the full, unobscured DarkSword code—complete with explanatory comments in English that describe each component and include the “DarkSword” name for the tool—available on those sites for anyone to access and reuse. That carelessness, he says, practically invites other hacker groups to adopt it and target other iPhone users. “Anyone who manually grabbed all the different parts of the exploit could put them onto their own web server and start infecting phones. It’s as simple as that,” says Frielingsdorf. “It’s all nicely documented, also. It’s really too easy.”

WIRED reached out to Apple for comment on the researchers’ findings, but the company didn’t provide comment. Google declined to comment beyond the blog post it released about its DarkSword findings.

According to Lookout, DarkSword is designed to steal data from vulnerable iPhones that include passwords and photos; logs from iMessage, WhatsApp, and Telegram; browser history; Calendar and Notes data; and even data from Apple’s Health app. Despite the apparent espionage focus of the hacking campaign, DarkSword also steals users’ cryptocurrency wallet credentials, suggesting the hackers may have carried out a possible side business in for-profit cybercrime.

Rather than install spyware that persists on users’ phones, DarkSword uses stealthier techniques that are more often seen in “fileless” malware that typically target Windows devices, hijacking the legitimate processes in an iPhone’s operating system to steal data. “Instead of using a spyware payload to brute force your way through the file system—which leaves tons of artifacts of exploitation that are pretty easy to detect—this just uses system processes the way they’re meant to be used,” iVerify’s Cole says. “And it leaves far fewer traces.”

Share. Facebook Twitter Pinterest LinkedIn Telegram Reddit Email
Previous ArticleYouTube is now asking viewers if videos feel like AI slop
Next Article Nekome: Nazi Hunter Preview – A Personal Crusade

Related Articles

20% Off LG Promo Code & Coupons | May 2026

20% Off LG Promo Code & Coupons | May 2026

13 May 2026
Apple iPhone’s Camera app could finally stop treating everyone like a beginner

Apple iPhone’s Camera app could finally stop treating everyone like a beginner

13 May 2026
H&R Block Coupon: 25% Off DIY + Tax Pro Assist

H&R Block Coupon: 25% Off DIY + Tax Pro Assist

13 May 2026
Your Android phone is about to get much better at blocking scams

Your Android phone is about to get much better at blocking scams

13 May 2026
Ready or Not, “Embodied AI” Is Leaving the Lab and Entering Infrastructure

Ready or Not, “Embodied AI” Is Leaving the Lab and Entering Infrastructure

13 May 2026
What Happens When You Try to Treat OCD With Psilocybin

What Happens When You Try to Treat OCD With Psilocybin

12 May 2026
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Don't Miss
Apple iPhone’s Camera app could finally stop treating everyone like a beginner

Apple iPhone’s Camera app could finally stop treating everyone like a beginner

By technologistmag.com13 May 2026

The iPhone Camera app has always been simple, sometimes to a fault. While this simplicity…

H&R Block Coupon: 25% Off DIY + Tax Pro Assist

H&R Block Coupon: 25% Off DIY + Tax Pro Assist

13 May 2026
Your Android phone is about to get much better at blocking scams

Your Android phone is about to get much better at blocking scams

13 May 2026
Ready or Not, “Embodied AI” Is Leaving the Lab and Entering Infrastructure

Ready or Not, “Embodied AI” Is Leaving the Lab and Entering Infrastructure

13 May 2026
What Happens When You Try to Treat OCD With Psilocybin

What Happens When You Try to Treat OCD With Psilocybin

12 May 2026
Technologist Mag
Facebook X (Twitter) Instagram Pinterest
  • Privacy
  • Terms
  • Advertise
  • Contact
© 2026 Technologist Mag. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.