New DarkSword iOS Exploit Used in Infostealer Attacks on iPhones

Related

Apple Account Change Alerts Abused to Send Phishing Emails

What happened Threat actors are abusing Apple's account change notification...

Infinity Stealer Grabs macOS Data via ClickFix Lures

What happened Infinity Stealer grabs macOS data via ClickFix lures...

Apple Pushes Background Security Improvements Update to Fix WebKit Flaw

What happened Apple released a background security improvements update designed...

DigitStealer Infostealer Targets macOS Systems and Cryptocurrency Wallet Data

What happened A macOS-targeting infostealer called DigitStealer has seen increased...

Share

What happened

Researchers uncovered a new iOS exploit known as DarkSword that is being used in infostealer attacks targeting Apple iPhones, allowing attackers to extract sensitive user data through malicious web links. The exploit targets devices running older versions of iOS and leverages multiple vulnerabilities in Safari to gain access to data such as messages, credentials, and cryptocurrency wallets. Security researchers, including teams from Google Threat Intelligence Group, Lookout, and iVerify, found that the attack uses a “hit-and-run” approach, rapidly collecting data and disappearing without leaving persistent malware on the device. The exploit has been observed in campaigns targeting users across multiple countries, with attackers embedding malicious code in compromised websites to trigger infections when visited. 

Who is affected

Users running older or unpatched versions of Apple iOS, particularly those who access compromised or malicious websites, are affected, as the exploit can silently extract sensitive data from targeted devices. 

Why CISOs should care

The campaign shows how advanced iOS exploits are being used in real-world infostealer operations, enabling rapid data theft without persistent malware and increasing risk across mobile enterprise environments. 

3 practical actions

  1. Ensure iOS devices are updated. The exploit targets outdated iOS versions that have since received security patches. 
  2. Monitor for abnormal mobile traffic. Detect unusual connections that may indicate data exfiltration from compromised devices. 
  3. Restrict access to untrusted websites. Prevent exposure to malicious domains hosting exploit payloads. 

For more reporting on cybersecurity developments involving the company, explore our coverage under the Apple tag.

e1057c44fd23a2339dd83fc7bd88822e97b8b3544e012414c207939b16e0441d?s=150&d=mp&r=g
+ posts