Apple Patches Coruna Exploit in Older iPhones

Apple backports critical security fixes for older iPhones patching exploited Coruna malware.

  • Apple has backported critical security fixes to older iPhones and iPads to patch a WebKit flaw exploited by the sophisticated Coruna malware kit.
  • The Coruna exploit framework contains 23 exploits designed to target iPhones running iOS versions 13.0 through 17.2.1.
  • Researchers note that two exploits within Coruna target the same vulnerabilities used in the high-profile Operation Triangulation campaign.
  • Evidence suggests Coruna was likely designed by U.S. military contractor L3Harris and may have been sold to a Russian broker.

On March 12, 2026, Apple released emergency security updates for several older iPhone and iPad models to counter a sophisticated exploit kit. The move backported patches for a critical vulnerability, CVE-2023-43010, which was being actively used by the Coruna framework.

- Advertisement -

This flaw, a memory corruption bug in WebKit, was originally fixed in late 2023. Consequently, the latest updates extend protection to devices like the iPhone 6s and original iPad Air that cannot run the newest iOS versions.

The backported iOS 15.8.7 update also includes fixes for three other flaws linked to Coruna, including a kernel privilege escalation bug, CVE-2023-41974. Meanwhile, Google recently revealed the exploit kit contains 23 exploits across five chains targeting a wide range of iOS versions.

Researchers at iVerify are tracking the malware, noting its similarities to frameworks developed by U.S. government-affiliated actors. Furthermore, reports indicate Coruna was likely designed by military contractor L3Harris.

An intriguing connection exists to the 2023 Operation Triangulation campaign. Specifically, Coruna weaponizes two of the same vulnerabilities used in that attack, according to Kaspersky.

- Advertisement -

However, attribution remains difficult. Boris Larin of Kaspersky GReAT stated, “Despite our extensive research, we are unable to attribute Operation Triangulation to any known APT group or exploit development company.” He emphasized that sharing exploited vulnerabilities does not confirm shared code.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

UK High Court Debates £3.2B Bitcoin Seizure Compensation

Victims of a Chinese investment fraud are challenging a UK plan to pay them...

Hyperliquid (HYPE) Defies Market Dip with 8% Daily Surge

Hyperliquid (HYPE) is the top daily performer among the top 100 cryptocurrencies, surging 8%...

Burry Criticizes Palantir’s AI Reliance Amid Military Use Reports

Investor Michael Burry challenged Palantir's AI claims in a public exchange with Elon Musk,...

US Prosecutors Urge Judge to Deny SBF Retrial Bid

Federal prosecutors have formally urged a judge to deny Sam Bankman-Fried's motion for a...

Bitcoin Slips Below $70K, Analyst Predicts $10K Plunge

Bitcoin (BTC) has dipped below $70,000 after failing to break the $72,000 resistance level...

Must Read

9 Best Books On Ethereum And Blockchain Technology

QUICK LINKSHow to Choose Your First Blockchain Book: A Simple Framework1. Define Your Goal: Are you looking to Build, Invest, or Understand?2. Assess Your...