Google”s Threat Intelligence Group has issued a stark warning regarding a sophisticated exploit named “Coruna,” which specifically targets older iPhones. This exploit poses a significant risk to cryptocurrency holders by potentially stealing wallet recovery phrases, enabling attackers to drain funds before victims even realize their wallets are compromised.
The Coruna exploit kit exploits vulnerabilities in iOS versions ranging from 13 to 17.2.1, utilizing a series of five exploit chains and at least 23 distinct flaws. The attack typically initiates when a user visits a compromised website, where hidden JavaScript identifies the device”s model, software version, and security settings. If the device is deemed vulnerable, the exploit takes control, escalating privileges and installing spyware without alerting the user.
Researchers emphasize that the spyware is tailored for cryptocurrency theft, actively searching for encrypted wallet files, login credentials, and mnemonic recovery phrases that are essential for wallet recovery on other devices. Once attackers obtain these phrases, they can swiftly transfer funds, often within minutes, before the victims become aware of any suspicious activity.
The methodology behind Coruna relies on “watering hole” tactics, wherein hackers compromise websites frequented by cryptocurrency users, including fake trading platforms and phishing sites. This approach turns routine browsing into a potential disaster for crypto assets, necessitating a reevaluation of how users store sensitive information.
Notably, there are possible links to nation-state actors, as researchers have discovered elements of the Coruna code that resemble tools believed to be associated with U.S. government cyber initiatives. However, it appears that this toolkit has leaked and is now being utilized by cybercriminals and intelligence agencies from countries like Russia and China.
Fortunately, defenses against this exploit are straightforward. The attack fails to function on devices running the latest iOS version, and it is thwarted by enabling Lockdown Mode. Additionally, using private browsing mode adds an extra layer of security. Best practices for users include maintaining rigorous patch discipline by updating iOS regularly, avoiding unknown cryptocurrency websites, and keeping recovery phrases offline to minimize risk.
The implications of this exploit are critical for both institutional and retail investors in the cryptocurrency market. Ensuring robust endpoint hygiene is now paramount in safeguarding digital assets, highlighting the urgent need for users to take proactive measures to protect their funds.












































