Skip to the content
  • Why Vertex
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Startups, Scaleups & FinTechs
    • Small & Medium Enterprises
    • Expertise in Education
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
  • Why Vertex
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Startups, Scaleups & FinTechs
    • Small & Medium Enterprises
    • Expertise in Education
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
LOG IN

Secret Government iPhone Hacking Tools: The Coruna Toolkit Leak and the Risks to Your Business

The digital landscape has recently been unsettled by revelations regarding “Coruna,” a highly sophisticated iPhone hacking toolkit. What makes this discovery particularly noteworthy is the evidence suggesting that these powerful tools may have originated from a United States government contractor. While such tools are typically developed for national security and intelligence purposes, the Coruna toolkit has now been identified in the hands of foreign espionage groups and profit-driven cyber criminals.

The Reality of Secret Government Hacking Tools

For many years, the existence of “zero-click” exploits and state-level hacking tools was a topic confined to intelligence circles. However, the discovery of Coruna demonstrates that these secret government tools are not only real but are increasingly leaking into the broader digital ecosystem.

Security researchers at Google and mobile security firm iVerify have identified that Coruna bears the distinct hallmarks of a professionally developed, state-grade exploitation suite. Reports suggest the toolkit was likely created by English-speaking developers for government use, costing millions of dollars to research and build. The fact that such a rare and valuable collection of hacking techniques is now being utilised by varied threat actors highlights a significant shift in the global threat environment.

How the Coruna Toolkit Operates

The sophistication of the Coruna toolkit is considerable. It does not rely on a single flaw but rather a collection of twenty-three distinct vulnerabilities within the iOS operating system. This allows the toolkit to bypass the advanced security defences that Apple has built into the iPhone.

One of the most concerning aspects of this toolkit is its ability to compromise a device with minimal user interaction. By simply visiting a website that has been compromised with the Coruna code, an iPhone can be infected silently. This “watering hole” attack method allows hackers to target specific groups of people or industries by compromising the websites they are likely to frequent.

From State Espionage to Criminal Profit

The journey of the Coruna toolkit illustrates the dangerous lifecycle of secret government tools when they are no longer under exclusive control. Researchers have tracked the use of this code through several stages:

  • Intelligence Operations: Initial components were linked to surveillance activities and suspected Russian espionage campaigns, targeting specific individuals via compromised Ukrainian websites.
  • Criminal Proliferation: The toolkit has since been adapted by criminal groups. It has been spotted on Chinese-language cryptocurrency and gambling sites, where it is used to deliver malware designed to steal digital assets from unsuspecting visitors.

This proliferation suggests a burgeoning secondary market for “second-hand” government exploits, where advanced hacking techniques are repurposed for financial gain.

Considerations for Enhancing Your Mobile Security

While the threat of state-grade tools is intimidating, there are several strategies that organisations can consider to help strengthen their defence against such advanced exploits:

  • Timely Software Updates: Apple frequently releases security patches to address the vulnerabilities exploited by toolkits like Coruna. Ensuring that your entire mobile fleet is running the latest version of iOS is a critical step in reducing your attack surface.
  • Deploying Mobile Device Management (MDM): An MDM solution allows a business to oversee and secure all company-issued devices, ensuring that security policies are enforced and updates are applied promptly across the organisation.
  • Monitoring and Auditing: Regular security audits and the use of advanced threat detection tools can help identify unusual patterns of behaviour on mobile devices that might indicate a compromise.
  • Adopting a Cautious Digital Culture: Encouraging employees to maintain a high level of vigilance, even when visiting familiar websites, can provide an additional layer of protection against sophisticated web-based exploits.

Partner with Vertex for Advanced Security

The emergence of secret government tools like Coruna in the public domain underscores the need for a professional and proactive approach to cybersecurity. At Vertex, we understand that “good enough” is not an option when defending against state-level sophistication.

Our team of experts specialises in providing comprehensive security solutions tailored to the unique needs of your business. Whether you require expert penetration testing, mobile security strategies, or ongoing system monitoring, Vertex is a valuable resource for navigating the complexities of the modern threat landscape.

To learn more about how we can help enhance your security posture or to discuss your specific requirements, please contact the team at Vertex for further assistance.

CATEGORIES

Vulnerability - Zero day

TAGS

Coruna toolkit - government hacking tools - iOS vulnerabilities - iPhone hacking - mobile security protection

SHARE

SUBSCRIBE

PrevPreviousAnthropic complains of AI Data Extraction Cyber Attack using AI chat siphoning vulnerability
NextIs Your AI Watching You? The Hidden Privacy Risks of Smart Glasses and ChatbotsNext

Follow Us!

Facebook Twitter Linkedin Instagram
Cyber Security by Vertex, Sydney Australia

Your partner in Cyber Security.

Terms of Use | Privacy Policy

Accreditations & Certifications

blank
blank
blank
  • 1300 229 237
  • Suite 10 30 Atchison Street St Leonards NSW 2065
  • 477 Pitt Street Sydney NSW 2000
  • 121 King St, Melbourne VIC 3000
  • Lot Fourteen, North Terrace, Adelaide SA 5000
  • Level 2/315 Brunswick St, Fortitude Valley QLD 4006, Adelaide SA 5000

(c) 2026 Vertex Technologies Pty Ltd (ABN: 67 611 787 029). Vertex is a private company (beneficially owned by the Boyd Family Trust).

download (2)
download (4)

We acknowledge Aboriginal and Torres Strait Islander peoples as the traditional custodians of this land and pay our respects to their Ancestors and Elders, past, present and future. We acknowledge and respect the continuing culture of the Gadigal people of the Eora nation and their unique cultural and spiritual relationships to the land, waters and seas.

We acknowledge that sovereignty of this land was never ceded. Always was, always will be Aboriginal land.