CT
CyberTimes
← Back to Threat Watch
darkswordiosiphoneCVE-2025-31277CVE-2025-43529CVE-2026-20700March 19, 2026 · CyberTimes Security Team

DarkSword iOS Exploit Kit: 6 Vulnerabilities, 3 Zero-Days, Full iPhone Takeover — 221 Million Devices Still at Risk

Google Threat Intelligence Group (GTIG), iVerify, and Lookout have jointly disclosed DarkSword — a full-chain iOS exploit kit that has been actively deployed since at least November 2025 against iPhon

Severity🔴 CRITICAL
CVSS Score9.8/10
ExploitedYes — active
Fix StatusPatch available
iPhone users running iOS 18.4 through 18.7 who have not yet updated to iOS 26.3.1 or iOS 18.7.6. iVerify estimates approximately 221 million devices remain vulnerable. The combined attack surface of DarkSword and the previously disclosed Coruna kit is estimated to affect hundreds of millions of unpatched devices running iOS versions 13 through 18.6.2.

Google Threat Intelligence Group (GTIG), iVerify, and Lookout have jointly disclosed DarkSword — a full-chain iOS exploit kit that has been actively deployed since at least November 2025 against iPhone users in Saudi Arabia, Turkey, Malaysia, and Ukraine. The kit chains six distinct iOS vulnerabilities, three of which were exploited as zero-days before being reported to Apple, to achieve complete device compromise in a single Safari page visit with no user interaction beyond loading the page. Multiple commercial surveillance vendors and at least one suspected Russian state-sponsored espionage group have deployed DarkSword in separate campaigns. iVerify estimates that approximately 221 million devices running iOS 18.4 through 18.6.2 remain vulnerable. Users must update to iOS 26.3.1 or iOS 18.7.6 immediately — these are the only versions with patches for all six vulnerabilities in the chain.


Affected products

  • ·iPhone running iOS 18.4 through iOS 18.7 — all models capable of running these versions
  • ·Safari and WebKit on all affected iOS versions — the initial exploit entry point
  • ·JavaScriptCore — CVE-2025-31277 (patched iOS 18.6 / 26.1) and CVE-2025-43529 (patched iOS 18.7.3 / 26.2)
  • ·dyld dynamic linker — CVE-2026-20700 PAC bypass (patched iOS 26.3)
  • ·ANGLE graphics layer — CVE-2025-14174 (patched iOS 18.7.3 / 26.2)
  • ·iOS kernel — CVE-2025-43510 memory management (patched iOS 18.7.2 / 26.1) and CVE-2025-43520 memory corruption (patched iOS 18.7.3 / 26.2)

How to Fix

Step-by-step remediation

All six DarkSword vulnerabilities have been patched by Apple. The final complete patch for all six landed in iOS 18.7.3 for the iOS 18 branch and iOS 26.3 for the iOS 26 branch. The current latest versions as of March 2026 are iOS 26.3.1 and iOS 18.7.6 — both contain all necessary patches. Update via Settings → General → Software Update. If your device is unable to update due to being an older model — check whether Apple has backported patches as they did with the Coruna exploit kit for older iPhones. Enable Lockdown Mode immediately as an interim measure while waiting for any backport. Google has added all identified DarkSword delivery domains to Safe Browsing. Ensure your iPhone has Safe Browsing enabled in Safari under Settings → Apps → Safari → Fraudulent Website Warning.


What happened

DarkSword is a complete exploit chain and infostealer written entirely in JavaScript — a design choice that is itself significant. There is no binary implant, no Mach-O library, and no traditional malware artifact. The entire attack executes in memory through JavaScript, allowing it to bypass Apple's Page Protection Layer and Secure Page Table Monitor mitigations that would block unsigned native binary code. The chain begins when a user visits a website containing a malicious iframe — either a compromised legitimate site or an attacker-controlled lure page. Once Safari loads the iframe, DarkSword executes automatically.

The six-vulnerability chain works in three distinct stages. Stage one is remote code execution — DarkSword exploits one of two JavaScriptCore memory corruption bugs depending on the target's iOS version. CVE-2025-31277, a JIT type confusion bug, targets iOS 18.4 and 18.5. CVE-2025-43529, a garbage collection bug in the DFG JIT layer, targets iOS 18.6 through 18.7. Both bugs allow an attacker to corrupt memory through a malicious webpage alone. Both are immediately chained with CVE-2026-20700 — a Pointer Authentication Code bypass in dyld, Apple's dynamic linker. PAC is a hardware-level security feature designed specifically to prevent code execution hijacking. Bypassing it is a prerequisite for everything that follows.

Stage two is sandbox escape. DarkSword first breaks out of WebKit's WebContent sandbox into the GPU process by exploiting CVE-2025-14174, a memory corruption bug in the ANGLE graphics translation layer. It then pivots from the GPU process into mediaplaybackd — a background system daemon responsible for media playback — using CVE-2025-43510, a memory management flaw in the iOS kernel. This double sandbox escape, from WebContent to GPU to mediaplaybackd, is architecturally novel and was used identically across all observed DarkSword deployments regardless of which RCE exploit was used for the first stage.

Stage three is full kernel compromise. CVE-2025-43520, a memory corruption flaw in the iOS kernel, is used from within mediaplaybackd to obtain arbitrary read/write access and arbitrary function call capabilities across the entire kernel. From there, the orchestrator payload pe_main.js lifts sandbox restrictions on the device's most privileged processes — configd, wifid, securityd, UserEventAgent, and Springboard — and injects targeted data-theft modules into each. The complete data collection is staged in accessible filesystem locations and exfiltrated to a command-and-control server.

Real-World Impact

Three distinct malware families have been deployed following successful DarkSword compromises. GHOSTBLADE — used by suspected Russian group UNC6353 in Ukraine — collects emails, iCloud Drive files, contacts, SMS messages, Safari browsing history and cookies, cryptocurrency wallet data, usernames, passwords, photos, call history, calendar entries, notes, and location history. GHOSTKNIFE — used by UNC6748 in Saudi Arabia via a Snapchat-themed lure site — functions as a JavaScript backdoor with extensive information theft capabilities including audio recording from the device microphone and a custom binary C2 protocol encrypted with ECDH and AES. GHOSTSABER — used by Turkish commercial surveillance vendor PARS Defense in campaigns targeting Turkey and Malaysia — supports over 15 distinct C2 commands and actively deletes crash logs to evade forensic detection. All three families specifically target cryptocurrency wallet applications. The DarkSword and Coruna exploit kits together are now estimated by iVerify to affect hundreds of millions of unpatched devices running iOS versions 13 through 18.6.2 — the combined attack surface represents one of the largest outstanding iOS exposure windows documented. Lookout researchers also noted evidence that large language models were used in the creation of at least some of the implant code, visible in functional comment structures throughout the JavaScript source.

Technical Details

DarkSword was named by researchers based on the variable const TAG = "DarkSword-WIFI-DUMP" found embedded in the malware's own source code. GTIG first observed DarkSword activity in November 2025 linked to UNC6748 targeting Saudi Arabian users via a Snapchat-themed phishing domain snapshare[.]chat. PARS Defense, a Turkish commercial surveillance vendor, used DarkSword in separate campaigns against Turkish and Malaysian users in November 2025 and January 2026. UNC6353, a suspected Russian espionage group previously linked to the Coruna exploit kit, deployed DarkSword against Ukrainian users via watering hole attacks on the News of Donbas news website and the official site of the Seventh Administrative Court of Appeals in Vinnytsia — campaigns that continued through March 2026. A Russian-language comment found in UNC6353's source code and GTIG's coordination with CERT-UA corroborates the Russian attribution. Apple addressed the vulnerabilities on a rolling basis between iOS 18.6 and iOS 26.3 after GTIG reported all six flaws. DarkSword is the second iOS exploit kit disclosed within a month, following Coruna — both have been used by the same Russian actor UNC6353.

🛡️ Prevention Tips

DarkSword is a watering hole and malicious iframe attack — meaning the compromised websites delivering it include legitimate Ukrainian news sites and government websites. Users cannot reliably avoid exposure by simply avoiding suspicious sites when attackers compromise trusted ones. The only reliable protection is keeping iOS fully updated. Enable automatic updates on your iPhone via Settings → General → Software Update → Automatic Updates — turn on both Download iOS Updates and Install iOS Updates. For users who are at higher risk — journalists, activists, government workers, executives, or anyone handling cryptocurrency — enable Lockdown Mode permanently. Lookout researchers specifically noted that DarkSword targets cryptocurrency wallets, broadening its financial threat beyond traditional espionage targets. If you store significant cryptocurrency on your iPhone, migrate to a hardware wallet and treat your iPhone as an untrusted device for high-value financial operations.


FAQs

How do I know which iOS version I need to be safe?

Update to iOS 26.3.1 or iOS 18.7.6 — these are the current latest versions and contain patches for all six DarkSword vulnerabilities. Go to Settings → General → Software Update. If an update is available, install it immediately.


I visited some websites recently on Safari — could I have been infected?

DarkSword attacks were primarily targeted at users in Saudi Arabia, Turkey, Malaysia, and Ukraine via specific compromised websites and lure pages. If you were not in those regions visiting those specific sites, direct infection is unlikely. However, the threat actors are expanding and the kit has been shared across multiple groups. If you are on an unpatched iOS version between 18.4 and 18.7, updating immediately is the correct action regardless.


Does this affect iPad too?

Yes. The exploit chain targets WebKit and iOS/iPadOS system components. iPadOS shares the same codebase as iOS and the same vulnerabilities apply. Update your iPad to the latest iPadOS version following the same steps.


Read Next