Coruna iOS Exploit Kit Targeting iOS 13-17.2.1
- Mar 5
- 2 min read
Key Findings
Google's Threat Intelligence Group (GTIG) identified a powerful new iOS exploit kit called Coruna (also known as CryptoWaters)
The kit targets Apple iPhones running iOS versions 13.0 through 17.2.1
It includes five full exploit chains and a total of 23 exploits
The kit is highly effective against the targeted iOS versions, but is ineffective against the latest iOS release
Background
GTIG first captured parts of an iOS exploit chain used by a customer of a surveillance company in February 2025
The exploits were integrated into a previously unseen JavaScript framework that used simple but unique obfuscation techniques
The framework was designed to fingerprint the device, detect the specific iPhone model and iOS version, and then load the appropriate WebKit remote code execution (RCE) exploit and pointer authentication code (PAC) bypass
Ukrainian Watering Hole Attacks
In July 2025, the same JavaScript framework was detected on the domain "cdn.uacounter[.]com", which was loaded as a hidden iFrame on compromised Ukrainian websites
The exploits deployed as part of the framework consisted of CVE-2024-23222, CVE-2022-48503, and CVE-2023-43000
The activity was assessed to be linked to a suspected Russian espionage group named UNC6353
Broad-scale Attacks by Chinese Threat Actor
In December 2025, the Coruna exploit kit was detected on a cluster of fake Chinese websites, most of them related to finance
The activity is attributed to a threat cluster tracked as UNC6691
Once the websites were accessed via an iOS device, a hidden iFrame was injected to deliver the Coruna exploit kit containing CVE-2024-23222
Exploit Chains and CVEs
The Coruna exploit kit includes a total of 23 exploits spanning versions from iOS 13 to iOS 17.2.1
Some of the CVEs exploited by the kit and the corresponding iOS versions they targeted are:
Neutron - CVE-2020-27932 (versions 13.x)
Dynamo - CVE-2020-27950 (versions 13.x)
buffout - CVE-2021-30952 (versions 13 → 15.1.1)
jacurutu - CVE-2022-48503 (versions 15.2 → 15.5)
IronLoader - CVE-2023-32409 (versions 16.0 → 16.3.116.4.0)
Photon - CVE-2023-32434 (versions 14.5 → 15.7.6)
Gallium - CVE-2023-38606 (versions 14.x)
Parallax - CVE-2023-41974 (versions 16.4 → 16.7)
terrorbird - CVE-2023-43000 (versions 16.2 → 16.5.1)
cassowary - CVE-2024-23222 (versions 16.6 → 17.2.1)
Conclusion
The Coruna exploit kit is a highly sophisticated and comprehensive collection of iOS exploits, with the most advanced ones using non-public exploitation techniques and mitigation bypasses. The framework surrounding the exploit kit is extremely well engineered, allowing multiple threat actors to reuse and adapt these advanced techniques for new vulnerabilities. The findings highlight the active market for second-hand zero-day exploits and the shift from highly targeted spyware attacks to broad-scale exploitation of iOS devices.
Sources
https://thehackernews.com/2026/03/coruna-ios-exploit-kit-uses-23-exploits.html
https://securityaffairs.com/188928/security/google-uncovers-coruna-ios-exploit-kit-targeting-ios-13-17-2-1.html
https://x.com/ScyScan/status/2029369477192925536

Comments