By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Concealed RepublicanConcealed Republican
  • Home
  • Latest News
  • Guns
  • Politics
  • Videos
Reading: New hack poses biggest iPhone threat in 19 years: What you can do
Share
Notification Show More
Font ResizerAa
Font ResizerAa
Concealed RepublicanConcealed Republican
  • News
  • Guns
  • Politics
  • Videos
  • Home
  • Latest News
  • Guns
  • Politics
  • Videos
Have an existing account? Sign In
Follow US
  • Advertise
  • Advertise
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Concealed Republican > Blog > News > New hack poses biggest iPhone threat in 19 years: What you can do
News

New hack poses biggest iPhone threat in 19 years: What you can do

Jim Taft
Last updated: March 14, 2026 8:09 pm
By Jim Taft 16 Min Read
Share
New hack poses biggest iPhone threat in 19 years: What you can do
SHARE

Apple has had a hard time lately with critical exploits plaguing iPhones all around the world. In mid-February, Google’s Threat Analysis Group discovered a critical zero-day vulnerability in Apple’s iOS software that gave hackers full control of a “small subset” of targeted iPhones. This month, reports revealed that an entire exploit tool kit has been successfully used by hackers in Russia and China. The worst part is that mounting evidence suggests the kit came from the United States, possibly even from our very own government.

Chock-full of vulnerabilities

According to Google’s full report, the exploit tool kit — dubbed Coruna — consists of five exploit chains and 23 exploits in total, all targeted at iPhones running iOS 13 to iOS 17.2.1. Mobile security experts at iVerify corroborated the report, claiming that 42,000 iPhones were affected.

Are there more zero-day vulnerabilities in iOS that we don’t know about? Almost certainly yes.

An exploit chain is the path a hacker can use to bypass a device’s security controls via exploits to gain access. In other words, if your phone’s software was a map, an exploit chain is the route a driver could take through different toll areas to reach the final destination. Even one exploit chain — or route — is enough to break into a device, but the fact that five routes exist within Coruna makes it a sophisticated hacking resource unlike anything security researchers have seen on iOS.

Google notes that Coruna has already been exploited by a “customer of a surveillance company,” as well as foreign nations, namely China and Russia. More alarming than that, however, “multiple threat actors” have also gained access to exploit techniques that can be customized to leverage new and unknown vulnerabilities for future attacks.

Image credit: Google

Where did Coruna come from?

Now that Coruna is out in the open, it only makes sense to wonder where it came from. Its sophisticated nature makes it highly unlikely that an independent hacker threw it together. Instead, several pieces of evidence point toward government intervention.

For starters, the tool kit’s source materials are all written in native English, suggesting English origins. Second, two of the exploits in the chain are linked directly to Operation Triangulation, a hardware vulnerability discovered in Apple’s first-party processing chips by Russian cybersecurity company Kaspersky. Russian government officials blamed the NSA for this exploit back in 2023, but the U.S. government denied any connection.

Third, iVerify’s co-founder and COO, Rocky Cole, reportedly called Coruna’s code “superb,” going on to state, “It was elegantly written. It’s fluid and holds together very well. There were comments in the code that, as someone who’s been around the U.S. defense industrial base for years, really are reminiscent of the sort of insider jokes and insider remarks that you might see from a U.S. based coder. Certainly they were native English language speakers.”

For what it’s worth, Kaspersky recently denied that Coruna is linked to the NSA, despite the evidence outlined above. Regardless of the tool kit’s origin, researchers are unsure how it made it into the hands of foreign entities.

RELATED: Apple issues a critical software update for iPhone. Install it now!

 Photo by Matt Cardy/Getty Images

Bigger signs of Apple’s compromised security

Apple’s iOS mobile platform is notoriously hard for hackers to crack, thanks to its closed nature, often frustrating U.S. criminal investigation agencies with its strong end-to-end encryption practices. The Coruna tool kit, however, changes everything. It’s the biggest collection of exploits to hit iOS since its inception in 2007. It’s also part of a growing trend that undermines Apple’s once-impenetrable software security and privacy protocols.

Just last month, Apple released iOS 26.3 to patch a critical zero-day vulnerability dubbed CVE-2026-20700. Although this remains to be a major threat to iPhone users, this exploit is not part of the Coruna tool kit. These are completely independent issues. Are there more zero-day vulnerabilities in iOS that we don’t know about? Almost certainly yes.

Tips to secure your device

That doesn’t mean there’s nothing you can do. As software vulnerabilities become more prevalent, the best way to keep your devices safe and secure is to make sure you always have the latest iOS updates downloaded and installed on your phone, tablet, and laptop.

The exploits in the Coruna tool kit that plagued iOS 13 through 17.2.1, as well as CVE-2026-20700 for iOS 26, have all been patched. If you haven’t updated your iPhone to the newest software, or if you’re not sure which version you have, check for updates by opening the Settings app. Then go to General, Software Update, and make sure you’re on one of these versions, depending on your phone’s model:

  • iOS 26.3.1 (iPhone 11 and up);
  • iOS 18.7.5 (Phone XS, XS Max, and XR);
  • iOS 16.7.14 (iPhone 8, 8 Plus, and X);
  • iOS 15.8.6 (iPhone 6s and 7); or
  • iOS 12.5.8 (iPhone 5s, 6, 6 Plus).

If you want even more protection from exploits and vulnerabilities, you can secure your private data with Apple’s Advanced Data Protection built directly into iCloud. Then for maximum protection, Apple offers Lockdown Mode, though this feature isn’t meant for everybody. Since it will ultimately restrict many of the features and functions of your device, it’s only meant for high-profile cyber-criminal targets like politicians, celebrities, and investigative journalists.



Read the full article here

You Might Also Like

The world cut the cord. Government won’t.

Google patches sixth Chrome zero-day attack of 2025 with urgent fix

John Mellencamp urges ‘RHOBH’ daughter home during cancer treatment

NFL news: Rams sign Trent McDuffie to record-breaking $124 million extension

Cornyn’s Backing of BSCA Coming Back to Bite Him

Share This Article
Facebook X Email Print
Previous Article Chappell Roan commands attention in sheer black look at Paris Fashion Week Chappell Roan commands attention in sheer black look at Paris Fashion Week
Next Article Former Sen. Sinema Acknowledges ‘Romantic And Intimate’ Relationship With Married Bodyguard In Lawsuit By Ex-Wife Former Sen. Sinema Acknowledges ‘Romantic And Intimate’ Relationship With Married Bodyguard In Lawsuit By Ex-Wife
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

The Pentagon Names Six Airmen Killed in KC-135 Crash Over Iraq
The Pentagon Names Six Airmen Killed in KC-135 Crash Over Iraq
Politics
Canadian woman waits 15 hours in ER for appendicitis, slams healthcare delays
Canadian woman waits 15 hours in ER for appendicitis, slams healthcare delays
News
Former Democrat Gettysburg Mayor Arrested on Child Sex Crimes [WATCH]
Former Democrat Gettysburg Mayor Arrested on Child Sex Crimes [WATCH]
Politics
Denver pastor refuses to stay silent: ‘To stay silent on biblical issues is to be complicit with evil’
Denver pastor refuses to stay silent: ‘To stay silent on biblical issues is to be complicit with evil’
News
Texas bans many China-linked medical devices over national security threats
Texas bans many China-linked medical devices over national security threats
News
Duke Leads NCAA Field as Arizona, Michigan, Florida Claim No. 1 Seeds
Duke Leads NCAA Field as Arizona, Michigan, Florida Claim No. 1 Seeds
Politics
© 2025 Concealed Republican. All Rights Reserved.
  • Privacy Policy
  • Terms of use
  • Press Release
  • Advertise
  • Contact
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?