Beautiful Virgin Islands

Wednesday, May 13, 2026

0:00
0:00

Apple issues an unusual warning: this is how your iPhone can be hacked without you doing anything

Apple urges users to urgently update their iPhones after new research revealed advanced hacking tools targeting outdated iOS versions, enabling deep remote access and large-scale data extraction.
Apple has issued an unusual warning, urging iPhone users to update their devices immediately.

The reason is new cybersecurity research indicating that Russian intelligence, Chinese cybercriminals, and malicious hackers are using advanced tools to take control of devices running older versions of the iOS operating system.

These tools, called DarkSword and Coruna, are no longer isolated vulnerabilities but full exploit kits.

They were described this month by Google and cybersecurity firms iVerify and Lookout as tools that provide hackers with deep remote access to iPhones, including the ability to access all of their contents.

At iVerify, the extent of access these tools can gain was detailed.

“DarkSword is a surveillance and intelligence-gathering tool that extracts data on a large scale, including Wi-Fi passwords, text messages, call history, full location data, browsing history, SIM details, and cellular data.

In addition, it has the ability to extract data from health apps, notes, and calendars,” according to the company’s blog.

Apple, on the other hand, emphasized that these tools are effective only against devices running older versions of the operating system.

“Keeping software up to date is the most important thing users can do to maintain the security of their Apple devices,” said company spokesperson Sarah O’Rourke in an official statement.

According to security experts interviewed by the media, the findings are concerning.

Despite Apple’s reputation as a company that produces relatively secure devices, it appears that older versions of iOS are particularly vulnerable, and this gap is exactly what attackers exploit.

According to researchers, several groups have already been targeted using these tools, including Ukrainian civilians targeted by Russian intelligence; crypto users in China; and citizens in Saudi Arabia, Turkey, and Malaysia.

Researchers emphasize that these tools can easily be used against any user with an outdated operating system.

Apple also noted that iOS 26, launched last September, already includes the necessary protections against these hacking tools.

Last week, the company even took an unusual step and released a dedicated update for older devices that cannot upgrade to the new version, in order to block these attacks.

Instead of chasing the victim, the hacker waits for them.

According to cybersecurity experts, DarkSword and Coruna infect devices by means of a watering hole attack—a method in which the attacker does not directly pursue the victim, but waits for them on a website they already tend to visit.

Attackers identify a website popular among their target audience, breach it or create a fake version of it, and embed malicious code within it.

From the moment the user enters the site, the code exploits a vulnerability in the device, such as an outdated iPhone, and can infect it automatically without any download or suspicious click.

This is precisely why the attack is particularly dangerous—the user makes no mistake, but simply arrives at the wrong place.

However, it should be noted that hacking an iPhone is still considered a significant technical challenge.

These two tools rely on a complex chain of vulnerabilities working together to take control of the device, with their uniqueness lying in the ability to package this chain into ready-to-use kits for hackers.

According to Rocky Cole, Chief Operating Officer of iVerify, who spoke to NBC: “There is a sense that attacks on iPhones are rare, almost mythical.

But that is not true, we simply do not really have the tools to see them.

It is much more common than people think”.

In simple terms—an iPhone may be considered one of the most secure smartphones on the market, but if it is not updated, it does not matter.

So if you have not yet updated your operating system—now is the time.

And if you are still storing information on your phone that you do not want to become public, then you have already done everything necessary for it to one day become public.
Newsletter

Related Articles

Beautiful Virgin Islands
0:00
0:00
Close
The Great Western Exit: Why Best Citizens Are Fleeing the Rich World [PODCAST]
The New Robber Barons of Intelligence: Are AI Bosses More Powerful Than Rockefeller?
The End of the Old Order [Podcast]
Britain’s Democracy Is Now a Costume
The AI Gold Rush Is Coming for America’s Last Open Spaces [Podcast]
The Pentagon’s AI Squeeze: Eight Tech Giants Get In, Anthropic Gets Shut Out [Podcast]
The War Map: Professor Jiang’s Dark Theory of Iran, Trump, China, Russia, Israel, and the Coming Global Shock [Podcast]
Labour Is No Longer a National Party [Podcast]
AI Isn’t Stealing Your Job. It’s Dismantling It Piece by Piece.
Lawyers vs Engineers: Why China Builds While America Litigates [Podcast]
Churchill’s Glass: The Drunk, the Doctor, and the Myth Britain Refuses to Sober Up From
Apple issues an unusual warning: this is how your iPhone can be hacked without you doing anything
The Met Gala Meets the Age of Billionaire Backlash
Russian Oligarch’s Superyacht Crosses Hormuz via Iran-Controlled Route
Gunfire Disrupts White House Correspondents’ Dinner as Trump Is Evacuated
A Leak, a King, and a Fracturing Alliance
Inside the Gates Foundation Turmoil: Layoffs, Scrutiny, and the Cost of Reputational Risk
UK Biobank Breach Exposes Health Data of 500,000, Listed for Sale on Chinese Platform
KPMG Cuts Around 10% of US Audit Partners After Failed Exit Push
French Police Probe Suspected Weather-Data Tampering After Unusual Polymarket Bets on Paris Temperatures
News Roundup
Microsoft lost 2.5 millions users (French government) to Linux
Privacy Problems in Microsoft Windows OS
News roundup
Péter András Magyar and the Strategic Reset of Hungary
Hungary After the Landslide — A Strategic Reset in Europe
×