BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Apple Patches Coruna Exploit in Older iPhones

Apple backports critical security fixes for older iPhones patching exploited Coruna malware.

  • Apple has backported critical security fixes to older iPhones and iPads to patch a WebKit flaw exploited by the sophisticated Coruna malware kit.
  • The Coruna exploit framework contains 23 exploits designed to target iPhones running iOS versions 13.0 through 17.2.1.
  • Researchers note that two exploits within Coruna target the same vulnerabilities used in the high-profile Operation Triangulation campaign.
  • Evidence suggests Coruna was likely designed by U.S. military contractor L3Harris and may have been sold to a Russian broker.

On March 12, 2026, Apple released emergency security updates for several older iPhone and iPad models to counter a sophisticated exploit kit. The move backported patches for a critical vulnerability, CVE-2023-43010, which was being actively used by the Coruna framework.

- Advertisement -

This flaw, a memory corruption bug in WebKit, was originally fixed in late 2023. Consequently, the latest updates extend protection to devices like the iPhone 6s and original iPad Air that cannot run the newest iOS versions.

The backported iOS 15.8.7 update also includes fixes for three other flaws linked to Coruna, including a kernel privilege escalation bug, CVE-2023-41974. Meanwhile, Google recently revealed the exploit kit contains 23 exploits across five chains targeting a wide range of iOS versions.

Researchers at iVerify are tracking the malware, noting its similarities to frameworks developed by U.S. government-affiliated actors. Furthermore, reports indicate Coruna was likely designed by military contractor L3Harris.

An intriguing connection exists to the 2023 Operation Triangulation campaign. Specifically, Coruna weaponizes two of the same vulnerabilities used in that attack, according to Kaspersky.

- Advertisement -

However, attribution remains difficult. Boris Larin of Kaspersky GReAT stated, “Despite our extensive research, we are unable to attribute Operation Triangulation to any known APT group or exploit development company.” He emphasized that sharing exploited vulnerabilities does not confirm shared code.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

‘Godfather of Crypto’ Predicts Bitcoin Drop to $57K in 2026

Michael Terpin, an influential crypto investor, predicts the Bitcoin bull cycle peaked and will...

Kraken Urges US Tax Reforms After Filing 56M Forms

Kraken issued over 56 million tax forms to the IRS in 2025, with 18.5...

Harvester Deploys New Linux Backdoor in Espionage

The cyber-espionage group Harvester has deployed a new Linux variant of its GoGra backdoor...

Best Shiba Inu Buy Under $0.00001? Gains 6.5% Monthly

Shiba Inu (SHIB) has rallied 2.5% in the last 24 hours amid a wider...

Bitcoin Surging as Saylor Outpaces BlackRock; Musk Hint

Bitcoin surged nearly 30% from a low of $60,000 in early Q2 2026, approaching...

Must Read

5 Best Crypto Jobs Sites To Land Your Next Six Figure Job

The cryptocurrency and blockchain job market has exploded. With new blockchain start-ups and projects being founded at a blistering pace, the demand for workers...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading