BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Apple Patches Coruna Exploit in Older iPhones

Apple backports critical security fixes for older iPhones patching exploited Coruna malware.

  • Apple has backported critical security fixes to older iPhones and iPads to patch a WebKit flaw exploited by the sophisticated Coruna malware kit.
  • The Coruna exploit framework contains 23 exploits designed to target iPhones running iOS versions 13.0 through 17.2.1.
  • Researchers note that two exploits within Coruna target the same vulnerabilities used in the high-profile Operation Triangulation campaign.
  • Evidence suggests Coruna was likely designed by U.S. military contractor L3Harris and may have been sold to a Russian broker.

On March 12, 2026, Apple released emergency security updates for several older iPhone and iPad models to counter a sophisticated exploit kit. The move backported patches for a critical vulnerability, CVE-2023-43010, which was being actively used by the Coruna framework.

- Advertisement -

This flaw, a memory corruption bug in WebKit, was originally fixed in late 2023. Consequently, the latest updates extend protection to devices like the iPhone 6s and original iPad Air that cannot run the newest iOS versions.

The backported iOS 15.8.7 update also includes fixes for three other flaws linked to Coruna, including a kernel privilege escalation bug, CVE-2023-41974. Meanwhile, Google recently revealed the exploit kit contains 23 exploits across five chains targeting a wide range of iOS versions.

Researchers at iVerify are tracking the malware, noting its similarities to frameworks developed by U.S. government-affiliated actors. Furthermore, reports indicate Coruna was likely designed by military contractor L3Harris.

An intriguing connection exists to the 2023 Operation Triangulation campaign. Specifically, Coruna weaponizes two of the same vulnerabilities used in that attack, according to Kaspersky.

- Advertisement -

However, attribution remains difficult. Boris Larin of Kaspersky GReAT stated, “Despite our extensive research, we are unable to attribute Operation Triangulation to any known APT group or exploit development company.” He emphasized that sharing exploited vulnerabilities does not confirm shared code.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Bank Lobby Targets Stablecoin Yield Rules in Senate Bill

The American Bankers Association (ABA) mobilized over 8,000 letters to Senate offices seeking tighter...

EToro Q1 Earnings Up 37% on Commodities Trading Boom

EToro's Q1 2026 net income rose 37% to $82 million, largely fueled by a...

Crypto ‘Godfather’ Shorts Bitcoin In Podcast Interview

Early Bitcoin advocate Michael Terpin, dubbed the "Godfather of Crypto," is now shorting Bitcoin.He...

Trump Brings Business Chiefs to China, Urges Xi to Open Market

President Donald Trump confirmed Wednesday that NVIDIA Corporation (NASDAQ: NVDA) CEO Jensen Huang is...

Senate Crypto Bill Faces Over 100 Amendments Before Vote

US Senate Banking Committee members have filed over 100 amendments to a crypto market...

Must Read

8 Best Bitcoin Offshore Hosting Providers

In this blog post, we'll list the top 8 best bitcoin offshore hosting providers that accept Bitcoin and other cryptocurrencies.As Bitcoin continues to grow...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading