FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

Russians Caught Stealing Ukrainian Data With iPhone Spyware

Gregory Zuckerman
Last updated: March 18, 2026 3:07 pm
By Gregory Zuckerman
Technology
6 Min Read
SHARE

Cybersecurity teams have uncovered a Russia-aligned operation using advanced iPhone hacking tools to plunder personal data from Ukrainians, in a campaign that blended nation-state tradecraft with smash-and-grab theft. Researchers at Google, iVerify, and Lookout say the activity cluster, tracked as UNC6353, deployed a new toolkit nicknamed Darksword to quietly raid phones for sensitive information and, unusually for a state actor, target cryptocurrency wallets.

The operation relied on compromised Ukrainian websites and strict geofencing so only users inside the country were exposed, underscoring a focused surveillance-and-theft push amid the ongoing war. While the tools were technically sophisticated, the attacks were brief by design, minimizing forensic footprints while maximizing data haul.

Table of Contents
  • What Researchers Found in the Darksword iPhone Spyware Campaign
  • How the iPhone Attacks Worked in Ukraine via Web Exploits
  • Attribution and Motives Behind the Russia-Aligned Campaign
  • Why It Matters for Mobile Security and User Privacy
  • Practical Steps Users in Ukraine Can Take to Stay Safer
Four iPhones in different colors (white, orange, dark blue, and black) are arranged side-by-side on a professional flat gray background with subtle geometric patterns.

What Researchers Found in the Darksword iPhone Spyware Campaign

According to analysis shared by Google’s threat researchers and the mobile security firms iVerify and Lookout, Darksword was engineered to extract high-value data at speed: passwords and authentication tokens, photos, message histories from WhatsApp, Telegram, and SMS, as well as browser history and device details. Lookout’s team assessed that the malware typically emptied targets of useful data within minutes before self-removing, a tactic that reduces the chance of detection while still revealing victims’ “pattern of life.”

Investigators linked this activity to a broader series of Ukrainian-focused iPhone exploits, including an earlier campaign involving a separate toolkit known as Coruna. The recurrence of independent toolchains aimed at iOS users suggests that high-end mobile spyware is more accessible and less rarefied than many defenders once believed.

How the iPhone Attacks Worked in Ukraine via Web Exploits

The campaign appears to have used a watering-hole strategy: booby-trapped Ukrainian websites delivered exploits to visiting iPhones, with delivery restricted to devices geolocated inside Ukraine. While technical details remain limited publicly, investigators point to web-based exploit chains—likely targeting WebKit or related components—that enabled on-device data theft without requiring physical access.

Unlike many mobile implants built for long-term espionage, Darksword emphasized rapid exfiltration and volatility. Its modular design allowed operators to deploy or update capabilities as needed, a hallmark of professional development. The toolkit also probed cryptocurrency apps, extracting wallet data and, where possible, moving funds—an atypical objective for state-linked actors that raises the prospect of mixed motives or budget-supplementing theft.

Researchers note that the blend of espionage and financial crime is becoming more common as sophisticated groups take cues from both nation-state and cybercriminal ecosystems. On iOS specifically, brief, non-persistent payloads are an effective way to bypass modern defenses and limit forensic evidence while still achieving mission goals.

iPhone spyware used in Russian cyber-espionage to steal Ukrainian data

Attribution and Motives Behind the Russia-Aligned Campaign

Both iVerify and Lookout assess with high confidence that the same Russia-aligned threat cluster behind Coruna is responsible for the Darksword operation. Rocky Cole, co-founder of iVerify, has said the campaign’s design points to operators interested in quickly mapping victims’ lives rather than staking out long-term access—an intelligence-driven objective that aligns with wartime surveillance priorities.

Coruna’s backstory also highlights the murky supply chain behind mobile spyware. Former L3Harris employees have described Coruna as a capability originally developed for Western government customers, including members of the Five Eyes alliance. Whether Darksword shares lineage, developers, or brokers with Coruna remains unproven, but the professional, modular architecture hints at a commercial-grade origin and an active market for iOS exploits.

Why It Matters for Mobile Security and User Privacy

For years, iPhones were viewed by many users as safer by default. Recent campaigns—from mercenary spyware to state-backed operations—show that perception is outdated. Google’s security teams have documented dozens of in-the-wild zero-day exploits across platforms annually, and mobile devices are now a prime intelligence target because they concentrate personal communications, photos, location, and financial access in one place.

Darksword’s fleeting “hit-and-run” approach underscores a broader shift: attackers no longer need persistence if a quick pass can expose backups, authentication cookies, message histories, and wallet seeds. The result is severe privacy harm even when traditional indicators of compromise are scarce.

Practical Steps Users in Ukraine Can Take to Stay Safer

Researchers recommend immediate, practical defenses:

  • Keep iPhones on the latest iOS release and enable automatic updates.
  • Avoid sideloading or installing unknown configuration profiles.
  • Consider Lockdown Mode if you face elevated risk.
  • For cryptocurrency, use hardware wallets where feasible and secure recovery phrases offline.
  • Revoke unused app permissions.
  • Treat unexpected website prompts with caution—especially on local sites that could be compromised.

Ukraine’s CERT-UA has repeatedly warned about mobile-focused activity since the invasion, and Apple regularly ships rapid security patches when exploitation is found. Still, as Darksword demonstrates, determined actors will keep investing in iPhone exploit chains. The best defense remains fast patching, minimal attack surface, and a healthy skepticism of unsolicited links and prompts—particularly when the stakes include your identity, your contacts, and your coins.

Gregory Zuckerman
ByGregory Zuckerman
Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial trends and innovations. Over the years, Gregory’s work has earned industry recognition for bringing clarity to complex financial topics, and he continues to focus on long-form journalism that explores hedge funds, private equity, and high-stakes investing.
Latest News
How Faceless Video Is Transforming Digital Storytelling
Oracle Cloud ERP Outage Sparks Renewed Debate Over Vendor Lock-In Risks
Why Digital Privacy Has Become a Mainstream Concern for Everyday Users
The Business Case For A Single API Connection In Digital Entertainment
Why Skins and Custom Servers Make Minecraft Bedrock Feel More Alive
Why Server Quality Matters More Than You Think in Minecraft
Smart Protection for Modern Vehicles: A Guide to Extended Warranty Coverage
Making Divorce Easier with the Right Legal Support
What to Know Before Buying New Glasses
8 Key Features to Look for in a Modern Payroll Platform
How to Refinance a Motorcycle Loan
GDC 2026: AviaGames Driving Innovation in Skill-Based Mobile Gaming
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.