Solutions4IT Logo
Money Back Guarantee
6 Month Trial Period
Plain English IT Support
No jargon, no tricky words
Trustworthy & Reliable
4.9* Google Reviews
Happy clients
99% Customer Satisfaction

A Powerful iPhone Hacking Toolkit Has Been Discovered

Cybersecurity researchers have uncovered a highly advanced iPhone hacking toolkit that may have already infected tens of thousands of devices worldwide.

The toolkit, known as Coruna, allows attackers to silently install malware on an iPhone simply by getting the user to visit a compromised website. No downloads, clicks, or obvious interaction are required.

What makes this discovery particularly concerning is the level of sophistication involved, suggesting it was originally built with significant funding and expertise.


How the iPhone Exploit Works

Coruna isn’t just a single vulnerability — it’s a collection of multiple exploits working together.

Researchers found that it uses 23 different weaknesses in Apple’s iOS software. These vulnerabilities allow attackers to bypass several layers of built-in iPhone security protections.

Once triggered through a website, the toolkit can:

  • Install malware without the user knowing

  • Access photos and personal files

  • Extract emails and other sensitive data

  • Steal cryptocurrency stored on the device

Because the attack runs through a browser component, simply visiting an infected site could be enough for the attack to succeed.

A Toolkit That Has Spread Between Different Groups

Security analysts believe the toolkit has changed hands multiple times, appearing in different cyber campaigns.

At various points, versions of the exploit were used for:

  • Surveillance operations

  • Targeted espionage campaigns

  • Criminal attacks aimed at stealing cryptocurrency

This suggests the toolkit has circulated through multiple organisations and threat groups. Not great.

Why This Is a Big Deal for Mobile Security

Tools like Coruna are extremely rare. Creating something this complex requires significant time, funding, and technical skill.

When sophisticated exploit frameworks escape their original environment and start circulating more widely, they can end up being reused or modified by other attackers.

Cybersecurity experts often compare situations like this to past incidents where powerful hacking tools eventually spread across the internet and were reused in large-scale cyberattacks.

 How Many Devices Could Be Affected

Based on network traffic linked to one campaign using the toolkit, researchers estimate that over 40,000 devices may have already been compromised.

However, the real number could be higher, as different versions of the exploit may have been used in other campaigns that are harder to track.

What Apple Users Should Do

The vulnerabilities used by the toolkit have now been patched in the latest versions of iOS.

That means the best protection is to keep your device fully updated.

Practical steps include:

  • Installing the latest iOS updates

  • Avoiding suspicious or unknown websites

  • Enabling advanced security features where available

Keeping devices updated remains one of the most effective ways to protect against new cyber threats.


We hope you’ve liked this blog. Stay tuned for more blogs like this. Stay safe!

© Copyright Solutions 4 IT Ltd 2026. All Rights Reserved. Terms & Conditions Privacy Policy