Connect with us
iOS exploit kit

Security

iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Device Takeover

iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Device Takeover

A sophisticated exploit kit targeting Apple iOS devices has been actively used by multiple threat actors to steal sensitive data since at least November 2025, according to reports from security researchers. The full-chain exploit, codenamed DarkSword, leverages six vulnerabilities, including three previously unknown zero-day flaws, to achieve complete device takeover.

Scope and Attribution of the Campaign

The Google Threat Intelligence Group (GTIG), alongside security firms iVerify and Lookout, disclosed the campaign. Their analysis indicates that multiple commercial surveillance vendors and suspected state-sponsored actors have utilized the DarkSword kit. This suggests the tools are being deployed for targeted espionage operations against specific individuals.

The exploit chain is designed to work on fully updated iPhones running the latest iOS versions available at the time of its deployment. By chaining together the six vulnerabilities, attackers can bypass Apple’s built-in security protections without any interaction from the device owner.

Technical Mechanism of the Attack

DarkSword operates as a full-chain exploit, meaning it combines multiple vulnerabilities to progress from initial access to full control. The attack begins by exploiting flaws in the iOS rendering engine to execute malicious code. Subsequent vulnerabilities in the kernel and other system components are then used to disable security mechanisms and install persistent spyware.

The use of three zero-day vulnerabilities is particularly significant. Zero-days are security flaws unknown to the software vendor, leaving no patch available for users. This makes attacks exploiting them extremely difficult to detect and prevent with conventional security software.

Impact and Data Theft Capabilities

Once installed, the spyware facilitated by DarkSword can access a vast array of sensitive information. This includes private messages from communication apps, emails, photos, real-time location data, and passwords stored on the device. The malware can also secretly activate the microphone and camera for surveillance.

The stealthy nature of the infection means victims are typically unaware their device has been compromised. The operation is believed to be highly targeted, focusing on individuals of interest to the threat actors, rather than being a broad, indiscriminate campaign.

Response and Mitigation

Apple was notified of the vulnerabilities by the researching firms. The company has since addressed all six security flaws, including the three zero-days, in subsequent iOS security updates released throughout late 2025 and early 2026. Users who keep their devices updated to the latest iOS version are protected from these specific exploits.

Security experts emphasize that this discovery underscores the persistent threat from well-resourced actors investing in advanced mobile exploitation. It highlights the critical importance of applying software updates promptly, as they often contain fixes for such critical vulnerabilities.

Ongoing Investigations and Future Outlook

The investigation into the DarkSword campaign and its users is ongoing. Researchers continue to analyze the malware’s code and infrastructure to identify patterns and potentially attribute the activity to specific groups with greater confidence. The commercial surveillance industry, which develops and sells such intrusion tools, remains a key focus for global cybersecurity policymakers.

Moving forward, the security community anticipates that similar advanced exploit kits will continue to emerge. Continued collaboration between technology companies, independent security researchers, and intelligence agencies is expected to be crucial for identifying and neutralizing these threats before they can be widely abused.

Source: Google Threat Intelligence Group, iVerify, Lookout

More in Security