FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

DarkSword Spyware Strikes Millions Of iPhones

Gregory Zuckerman
Last updated: March 18, 2026 11:02 pm
By Gregory Zuckerman
Technology
6 Min Read
SHARE

A sophisticated new iPhone spyware campaign dubbed DarkSword is sweeping across the web, silently raiding devices when users simply visit a booby-trapped page. Researchers at Google’s Threat Analysis Group, alongside security firms Lookout and iVerify, say the drive‑by attacks chain multiple iOS vulnerabilities to steal troves of data without installing an app or requiring a tap beyond loading the site.

The tooling targets iOS 18.4 through 18.7, according to the teams analyzing the exploits. Apple’s own developer adoption figures indicate roughly 25% of active iPhones are on some iteration of iOS 18, a data point highlighted by reporting from Wired—putting hundreds of millions of devices in the potential blast radius.

Table of Contents
  • How DarkSword Works: A stealthy iOS drive‑by attack
  • Who Is Being Targeted by the DarkSword iPhone campaign
  • DarkSword’s scale and exposure across vulnerable iPhones
  • What Apple and researchers say about DarkSword fixes
  • What iPhone users should do now to reduce DarkSword risk
  • Why this matters for iPhone security and mobile defense
An iPhone displaying the Control Center interface, resized to a 16:9 aspect ratio with a clean, professional background.

How DarkSword Works: A stealthy iOS drive‑by attack

DarkSword operates as a classic watering‑hole attack: adversaries seed or compromise websites likely to attract specific targets, then use an exploit chain—almost certainly centered on the browser engine powering every iOS browser—to seize control. Visiting the page is enough for the spyware to begin harvesting data.

Unlike long‑term surveillance implants, DarkSword behaves like a smash‑and‑grab tool. Lookout’s analysis notes that once the malware finishes exfiltrating the data it wants, it removes its working files and exits. Dwell time is measured in minutes, not months, dramatically reducing forensic traces and making victim notification and attribution harder.

The scope of what can be siphoned is unusually broad. Investigators say DarkSword can access call logs, contacts, calendars, notes, photos and screenshots, precise location history, browsing history, and device identifiers. Critically, it can pull items from the device keychain, SIM and Wi‑Fi details, iCloud‑related content, and data from popular messaging apps including iMessage, WhatsApp, and Telegram—as well as credentials for cryptocurrency wallets.

Who Is Being Targeted by the DarkSword iPhone campaign

Early activity traced by Google indicates broad, geographically diverse operations. One November campaign targeted users in Saudi Arabia via a Snapchat‑themed lure called “Snapshare” that quietly infected devices while forwarding visitors to the real Snapchat site to mask the compromise.

DarkSword spyware strikes millions of iPhones, malware warning on screen

More recent incidents leveraged compromised Ukrainian news outlets and official government websites to reach iPhone users inside the country. Google attributes these to a cluster it tracks as UNC6353, a group with suspected ties to Russian state interests. The same actor is believed to be linked to a prior iOS exploit kit known as Coruna, which went after devices on iOS 13 through 17—suggesting a sustained, evolving capability rather than a one‑off breakthrough.

DarkSword’s scale and exposure across vulnerable iPhones

The frictionless nature of DarkSword’s delivery is what elevates the risk. No prompts, profiles, or app installs are required; a single visit to a compromised page is enough. Because all iOS browsers rely on the same underlying engine, any in‑the‑wild WebKit bugs can have universal impact until patched. Short‑lived, file‑light execution also sidesteps many traditional indicators that defenders rely on.

Compounding the concern, researchers say operators have not tried especially hard to conceal their tooling—leaving enough artifacted code that others could potentially copy or repurpose it. That brazenness suggests a growing market for iOS exploit chains and confidence among well‑resourced actors that new variants will follow even after patches land.

What Apple and researchers say about DarkSword fixes

Google’s TAG, Lookout, and iVerify have shared technical details, indicators, and targeting patterns with Apple and relevant CERT teams to aid remediation. As is typical with browser‑based attacks, fixes are expected to arrive via iOS and WebKit security updates. Historically, Apple has moved quickly with Rapid Security Responses when active exploitation is confirmed.

What iPhone users should do now to reduce DarkSword risk

  • Update immediately to the latest iOS release and enable both Automatic Updates and Rapid Security Responses. These patches generally close the underlying browser and kernel bugs that make drive‑by attacks possible.
  • Consider turning on Lockdown Mode if you are at elevated risk or likely to be targeted via watering‑hole sites; it reduces attack surface in Safari and messaging. Rotate passwords for any accounts used on the device, enable strong multi‑factor authentication, and review your iCloud sessions and security settings. Clearing Safari website data can also cut off lingering session artifacts.
  • Be skeptical of unsolicited links sent via social apps, SMS, or email, and favor navigating directly to trusted news and government portals rather than following embedded links. While private browsing is helpful, it does not neutralize an exploit chain; only patches do.

Why this matters for iPhone security and mobile defense

DarkSword underscores a sobering reality: top‑tier iOS exploit chains are no longer the exclusive domain of boutique surveillance vendors. The combination of high‑reach watering holes, rapid in‑memory data theft, and willingness to leave code behind points to an ecosystem where copycats can emerge quickly. For consumers, the best defense remains swift patching. For enterprises and governments, it is a reminder to treat mobile browsers as critical infrastructure—not just an app—and to invest in telemetry, user education, and rapid response plans tailored to the mobile threat surface.

Gregory Zuckerman
ByGregory Zuckerman
Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial trends and innovations. Over the years, Gregory’s work has earned industry recognition for bringing clarity to complex financial topics, and he continues to focus on long-form journalism that explores hedge funds, private equity, and high-stakes investing.
Latest News
Oracle Cloud ERP Outage Sparks Renewed Debate Over Vendor Lock-In Risks
Why Digital Privacy Has Become a Mainstream Concern for Everyday Users
The Business Case For A Single API Connection In Digital Entertainment
Why Skins and Custom Servers Make Minecraft Bedrock Feel More Alive
Why Server Quality Matters More Than You Think in Minecraft
Smart Protection for Modern Vehicles: A Guide to Extended Warranty Coverage
Making Divorce Easier with the Right Legal Support
What to Know Before Buying New Glasses
8 Key Features to Look for in a Modern Payroll Platform
How to Refinance a Motorcycle Loan
GDC 2026: AviaGames Driving Innovation in Skill-Based Mobile Gaming
Best Dumbbell Sets for Strength Training: An All-Time Buyer’s Guide
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.