A newly discovered DarkSword vulnerability chain in older Apple iOS versions specifically targets encrypted applications and private data, posing serious risksA newly discovered DarkSword vulnerability chain in older Apple iOS versions specifically targets encrypted applications and private data, posing serious risks

DarkSword iOS Vulnerability Chain Targets Encrypted Apps and Private Data

2026/03/20 21:01
5 min read
For feedback or concerns regarding this content, please contact us at [email protected]

A newly disclosed iOS exploit chain called DarkSword is targeting encrypted applications and private data on millions of Apple devices, with crypto wallet and exchange apps among its primary targets. Discovered by Google’s Threat Intelligence Group (GTIG) and confirmed by security firms Lookout and iVerify, the vulnerability chain affects unpatched iOS versions 18.4 through 18.7 and has been active since at least November 2025.

Six Chained Vulnerabilities, Three Zero-Days

DarkSword is not a single flaw. It chains six separate vulnerabilities, three of which were zero-days at the time of discovery: CVE-2025-31277, CVE-2025-43529, CVE-2025-14174, CVE-2025-43510, CVE-2025-43520, and CVE-2026-20700. Together, these exploits allow full device compromise in a sequence that escalates from initial browser access to deep system-level control.

A vulnerability “chain” differs from a single exploit in that each link handles a different layer of iOS security. One CVE may break out of the Safari sandbox, another escalates kernel privileges, and another disables code-signing checks. Chaining them produces a full compromise that no single vulnerability could achieve alone.

The attack begins when a user visits a compromised legitimate website using Safari. A malicious iFrame delivers the JavaScript-based exploit, requiring no interaction beyond loading the page. This “watering hole” approach makes DarkSword particularly dangerous, as victims have no way to distinguish a compromised site from a safe one.

Once a device is compromised, three distinct malware families are deployed: GHOSTBLADE, GHOSTKNIFE, and GHOSTSABER. According to GTIG’s published research, multiple commercial surveillance vendors and suspected state-sponsored actors have been observed using DarkSword in distinct campaigns since November 2025.

At least three threat actors have been identified. UNC6748 operates from Saudi Arabia, UNC6353 is a suspected Russian espionage group that incorporated DarkSword into watering hole campaigns targeting Ukraine, and PARS Defense is a Turkish commercial surveillance vendor. Confirmed targets span Saudi Arabia, Turkey, Malaysia, and Ukraine.

Why Crypto Wallets and Exchange Apps Face Direct Risk

What sets DarkSword apart from generic iOS exploits is its explicit targeting of cryptocurrency applications. The exploit specifically goes after six major exchange apps: Coinbase, Binance, Kraken, KuCoin, OKX, and MEXC. Seven wallet apps are also targeted: Ledger, Trezor, MetaMask, Exodus, Uniswap, Phantom, and Gnosis Safe.

Mobile crypto wallets rely on iOS data protection APIs and the Secure Enclave to isolate private keys, seed phrases, and authentication tokens within encrypted app sandboxes. A successful chain exploit bypasses these protections entirely, allowing attackers to extract data that is normally inaccessible even to other apps on the same device.

The risk compounds for users who store 2FA apps, password managers, or exchange API keys on the same device. DarkSword also harvests email, iCloud files, SMS and iMessage content, Wi-Fi passwords, Safari cookies, Telegram and WhatsApp chat logs, and geolocation data. The disclosure comes amid a period of heightened regulatory activity around crypto security standards, adding urgency to the mobile threat landscape.

Lookout Security described DarkSword’s operational method as a “hit-and-run” approach, collecting and exfiltrating targeted data within seconds or at most minutes, followed by cleanup. This means affected users may never realize their device was compromised.

An estimated 221 to 270 million devices are running affected iOS versions. Older iPhone models that cannot upgrade beyond iOS 18.x are permanently stuck on vulnerable software unless Apple backports specific patches. No confirmed dollar-value losses from crypto wallet targeting have been published, but the harvesting of private keys and exchange credentials poses clear theft risk.

What Crypto Holders Should Do Right Now

Apple has patched all six CVEs. Users should update immediately to iOS 26.3.1 or iOS 18.7.6, depending on device compatibility. Checking your current version takes seconds: go to Settings, then General, then Software Update.

If your device no longer receives iOS updates, move significant crypto holdings to a hardware wallet that is not connected to the compromised device. With DApp revenue declining across major chains and broader market uncertainty, securing existing holdings takes priority over active trading on vulnerable devices.

Avoid storing seed phrases, private keys, or recovery codes in note apps, screenshots, or iCloud storage on any mobile device. These are among the data categories DarkSword specifically targets.

For high-risk users, Apple’s Lockdown Mode (available on iOS 16 and later) restricts certain app capabilities and hardens the attack surface. While it limits some functionality, it blocks several of the vectors DarkSword exploits, including malicious web content delivery.

Google has added DarkSword delivery domains to Safe Browsing, which provides a layer of protection for Chrome and Safari users. However, this only covers known domains, and new delivery infrastructure could emerge. Users tracking Bitcoin ETF flows and broader market signals should be equally attentive to the security of the devices they trade from.

GTIG noted that “the use of both DarkSword and Coruna by a variety of actors demonstrates the ongoing risk of exploit proliferation.” Coruna, a related but separate exploit kit, targets even older iOS versions from 13.0 through 17.2.1, broadening the total population of vulnerable devices.

With the Fear and Greed Index at 11, reflecting extreme fear across crypto markets, the timing of this disclosure adds another pressure point for holders already navigating volatile conditions. Securing mobile devices is now as critical as securing wallets themselves.

Disclaimer: This article is for informational purposes only and does not constitute financial or investment advice. Cryptocurrency and digital asset markets carry significant risk. Always do your own research before making decisions.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

ArtGis Finance Partners with MetaXR to Expand its DeFi Offerings in the Metaverse

ArtGis Finance Partners with MetaXR to Expand its DeFi Offerings in the Metaverse

By using this collaboration, ArtGis utilizes MetaXR’s infrastructure to widen access to its assets and enable its customers to interact with the metaverse.
Share
Blockchainreporter2025/09/18 00:07
One Of Frank Sinatra’s Most Famous Albums Is Back In The Spotlight

One Of Frank Sinatra’s Most Famous Albums Is Back In The Spotlight

The post One Of Frank Sinatra’s Most Famous Albums Is Back In The Spotlight appeared on BitcoinEthereumNews.com. Frank Sinatra’s The World We Knew returns to the Jazz Albums and Traditional Jazz Albums charts, showing continued demand for his timeless music. Frank Sinatra performs on his TV special Frank Sinatra: A Man and his Music Bettmann Archive These days on the Billboard charts, Frank Sinatra’s music can always be found on the jazz-specific rankings. While the art he created when he was still working was pop at the time, and later classified as traditional pop, there is no such list for the latter format in America, and so his throwback projects and cuts appear on jazz lists instead. It’s on those charts where Sinatra rebounds this week, and one of his popular projects returns not to one, but two tallies at the same time, helping him increase the total amount of real estate he owns at the moment. Frank Sinatra’s The World We Knew Returns Sinatra’s The World We Knew is a top performer again, if only on the jazz lists. That set rebounds to No. 15 on the Traditional Jazz Albums chart and comes in at No. 20 on the all-encompassing Jazz Albums ranking after not appearing on either roster just last frame. The World We Knew’s All-Time Highs The World We Knew returns close to its all-time peak on both of those rosters. Sinatra’s classic has peaked at No. 11 on the Traditional Jazz Albums chart, just missing out on becoming another top 10 for the crooner. The set climbed all the way to No. 15 on the Jazz Albums tally and has now spent just under two months on the rosters. Frank Sinatra’s Album With Classic Hits Sinatra released The World We Knew in the summer of 1967. The title track, which on the album is actually known as “The World We Knew (Over and…
Share
BitcoinEthereumNews2025/09/18 00:02
Vistra (VST) Stock Drops 7% as Insider Sales Spook the Market

Vistra (VST) Stock Drops 7% as Insider Sales Spook the Market

TLDR Vistra (VST) stock fell as much as 7.16% as investors reacted to heavy insider selling by the CEO and top executives filed with the SEC. The stock also hit
Share
Coincentral2026/03/21 01:25