I Need IT Support Now
DarkSword
Shane

DarkSword iOS Exploit: 220+ Million iPhones at Risk – What Houston Area Businesses Need to Know

What Houston Businesses Need to Know About the DarkSword iOS Exploit – The Business Case for Mobile Device Management After DarkSword

DarkSword iOS Exploit: 220+ Million iPhones at Risk from State-Sponsored Attack Chain
Cybersecurity Alert

DarkSword iOS Exploit: 220+ Million iPhones at Risk - What Houston Area Businesses Need to Know

A six-vulnerability exploit kit is being sold on a secondary market to spies and criminals alike - and your team's iPhones may be targets.

TL;DR
DarkSword is a full iOS exploit chain using six vulnerabilities and three zero-days to compromise iPhones running iOS 18.4-18.7. Used by state-sponsored hackers and surveillance vendors across four countries, it steals everything from credentials to crypto wallets within seconds. Update all iPhones to iOS 26.3.1 immediately.

Two iOS exploit kits discovered in a single month. That's the situation Apple and its 1.5 billion iPhone users are now facing. On March 18, 2026, Google's Threat Intelligence Group (GTIG), Lookout, and iVerify jointly disclosed DarkSword - a complete iOS exploit chain that has been silently compromising iPhones since at least November 2025. It follows just two weeks after the disclosure of a similar kit called Coruna.

What makes DarkSword especially alarming for Houston-area businesses isn't just the sophistication of the attack. It's who is using it. State-sponsored hackers, commercial surveillance vendors, and financially motivated criminals are all buying access to the same exploit kit. The old assumption that this kind of attack only targets journalists and political dissidents? That's out the window.

Immediate Action Required: If your business uses iPhones running any version of iOS 18 through 18.7, those devices are potentially vulnerable. Update to iOS 26.3.1 or iOS 18.7.6 now. If you need help enforcing updates across your organization, CinchOps managed IT support can push policies to every device in your fleet.
🗡️
What Is DarkSword?
A full-chain iOS exploit kit that turns a single website visit into total device compromise.

DarkSword is a complete exploit framework written entirely in JavaScript. It chains together six separate vulnerabilities to take an iPhone from "browsing a website" to "fully compromised" in a matter of seconds. The name comes from an internal label found in the exploit code itself.

The attack works through what security researchers call a "watering hole" technique. Attackers don't need to send you a phishing email or trick you into downloading anything. They compromise a legitimate website - a news outlet, a government portal, a business site - and inject a hidden iframe containing malicious JavaScript. When an iPhone with a vulnerable iOS version loads that page in Safari, DarkSword fires automatically.

Google's Threat Intelligence Group first observed DarkSword activity in November 2025. By December, multiple distinct threat actors were using it in campaigns across Saudi Arabia, Turkey, Malaysia, and Ukraine. GTIG reported all vulnerabilities to Apple in late 2025, and the last patch landed with iOS 26.3 in February 2026.

Here's the part that should concern every business owner: DarkSword was found being sold on a secondary market. This isn't a one-off tool built by a single intelligence agency. It's a commercial product being distributed to anyone willing to pay. Lookout researchers noted that both DarkSword and its predecessor Coruna show signs of AI-assisted code development, with LLM-generated comments explaining functionality throughout the codebase.

DarkSword timeline: November 2025 - March 2026 Nov 2025 UNC6748 targets Saudi Arabia Fake Snapchat site delivers GHOSTKNIFE backdoor (iOS 18.4) Nov 2025 PARS Defense deploys in Turkey Encrypted delivery, GHOSTSABER backdoor (iOS 18.4-18.7) Dec 2025 UNC6353 targets Ukraine Watering hole attacks via compromised news/gov sites, GHOSTBLADE Jan 2026 PARS Defense customer targets Malaysia Different loader with enhanced device fingerprinting logic Feb 2026 Apple patches CVE-2026-20700 in iOS 26.3 CISA adds to KEV catalog, mandates federal remediation by March 5 Feb 2026 All six vulnerabilities now patched across iOS releases iOS 26.1, 26.2, 26.3, 18.7.2, 18.7.3 address different CVEs Mar 2026 Joint disclosure by GTIG, Lookout, and iVerify UNC6353 Ukraine attacks still active through March 2026 UNC6748 PARS Defense UNC6353 Apple/CISA Disclosure
⛓️
The Six-Vulnerability Exploit Chain
Three zero-days and three known flaws chained together for full device takeover.

DarkSword doesn't rely on a single bug. It chains six vulnerabilities together, moving through distinct stages - remote code execution, sandbox escape, privilege escalation, and payload deployment. Three of these were exploited as zero-days before Apple had patches available.

The vulnerabilities in the chain:

  • CVE-2025-31277: A memory corruption flaw in JavaScriptCore (Safari's JavaScript engine) that gives the attacker initial code execution. Used against devices running iOS versions before 18.6.
  • CVE-2025-43529 (zero-day): A separate JavaScriptCore garbage collection bug used for code execution on iOS 18.6 and 18.7 devices. Patched in iOS 18.7.3 and 26.2.
  • CVE-2026-20700 (zero-day): A flaw in dyld, Apple's dynamic link editor, used to bypass Pointer Authentication Codes (PAC) - a hardware-level security feature. This was the first actively exploited Apple zero-day of 2026. Added to CISA's Known Exploited Vulnerabilities catalog. Patched in iOS 26.3.
  • CVE-2025-14174 (zero-day): A memory corruption vulnerability in ANGLE (the graphics abstraction layer) used for sandbox escape through the GPU process. Patched in iOS 18.7.3 and 26.2.
  • CVE-2025-43510: A memory management vulnerability in the iOS kernel that allows the attacker to move from the GPU process to kernel-level access. Patched in iOS 18.7.2 and 26.1.
  • CVE-2025-43520: A kernel memory corruption flaw used for final privilege escalation, giving the attacker arbitrary read/write access and the ability to execute injected JavaScript with full device privileges.

The attack flow is methodical. DarkSword first exploits a Safari bug for code execution, then escapes the WebContent sandbox by pivoting into the GPU process, then moves from the GPU process into mediaplaybackd (a system daemon handling media playback), then compromises the XNU kernel for full device control. All of this happens while the user sees nothing unusual on their screen.

DarkSword exploit chain: 6 flaws, 4 stages User visits compromised website Stage 1: Remote code execution CVE-2025-31277 JavaScriptCore (iOS <18.6) or CVE-2025-43529 JavaScriptCore (iOS 18.6+) zero-day Stage 2: PAC bypass via CVE-2026-20700 dyld flaw defeats hardware pointer authentication zero-day Stage 3: Sandbox escape + kernel access CVE-2025-14174 ANGLE memory corruption zero-day CVE-2025-43510 iOS kernel memory flaw WebContent → GPU GPU → kernel Stage 4: Full privilege via CVE-2025-43520 Kernel memory corruption grants arbitrary read/write Payload deployed GHOSTBLADE / GHOSTKNIFE / GHOSTSABER Entire chain completes in seconds - user sees nothing unusual Zero-day (3) Known flaw (3) All 6 now patched by Apple
🎭
Who's Using DarkSword?
From Russian espionage groups to commercial surveillance vendors - a troubling range of buyers.

What sets DarkSword apart from typical exploit disclosures is the breadth of actors using it. Google identified at least three distinct groups, each with different targets and objectives.

  • UNC6748: Targeted Saudi Arabian users in November 2025 using a fake Snapchat website (snapshare[.]chat). Deployed GHOSTKNIFE, a JavaScript backdoor capable of stealing account data, messages, browser history, location, and recordings.
  • PARS Defense (Turkish surveillance vendor): Used DarkSword in Turkey in November 2025 and in Malaysia through a different customer in January 2026. Deployed GHOSTSABER, a backdoor with device enumeration, file listing, data exfiltration, and arbitrary JavaScript execution capabilities. This group applied more sophisticated OPSEC, encrypting exploit payloads between server and victim.
  • UNC6353 (suspected Russian espionage): Launched watering hole attacks against Ukrainian users from December 2025 through March 2026. Deployed GHOSTBLADE, an information stealer targeting credentials, crypto wallets, photos, messages, and location data. This same group previously used the Coruna exploit kit.

The UNC6353 campaign is particularly notable because the attackers compromised legitimate Ukrainian websites - including a news agency and a government court portal - to deliver DarkSword. Anyone visiting those sites on a vulnerable iPhone got hit.

Google's assessment is blunt: there are likely additional threat actors using DarkSword that haven't been identified yet.

⚠️

The Secondary Market Problem

Lookout researchers flagged a disturbing trend: there appears to be a secondary market for technically advanced iOS exploit chains where sellers have no concern for how their tools will be used. Groups with limited technical resources can now purchase top-tier exploits and customize them - potentially with the help of AI - for their specific targets. This means the threat isn't limited to high-profile espionage. Any business could become a target.

Learn about CinchOps cybersecurity services →
🎯
Who's at Risk - and How Many Devices?
The numbers are staggering: up to 296 million iPhones could be affected.

iVerify estimates that 14.2% of all iOS users - approximately 221.5 million devices running iOS 18.4 through 18.6.2 - are directly vulnerable to the DarkSword exploit chain. If the underlying vulnerabilities can be exploited against iOS versions below 18.4 and above 26.x (which hasn't been ruled out), the number jumps to roughly 296 million devices, or about 19% of all iPhones worldwide.

For Katy and Houston-area businesses, think about how many iPhones are in your organization right now. Every employee who hasn't updated their phone is carrying a potentially compromised device into your office, connecting to your Wi-Fi, accessing your email, your cloud apps, your client data.

The targets so far have been geographically concentrated - Saudi Arabia, Turkey, Malaysia, Ukraine - but the exploit kit itself isn't region-locked. Any iPhone running a vulnerable iOS version is fair game. And with DarkSword available on a secondary market, it's only a matter of time before it shows up in campaigns targeting U.S. businesses.

Industries handling sensitive financial data, client records, or intellectual property should consider themselves high-priority targets. That includes law firms, wealth management firms, CPA practices, and oil and gas companies - all of which are well-represented across the Houston metro area.

📱
What DarkSword Steals
A "hit-and-run" data grab that empties your phone in seconds.

Lookout described DarkSword's approach as a "hit-and-run" - the malware collects and exfiltrates targeted data within seconds to minutes, then cleans up after itself. That short operational window makes detection extremely difficult.

The GHOSTBLADE malware family (deployed by UNC6353) collects:

  • Credentials: Usernames, passwords, and encryption keys stored on the device
  • Cryptocurrency data: Wallet apps, exchange data, and private keys across multiple crypto platforms
  • Communications: iMessage, Telegram, WhatsApp messages, email, SMS, and call history
  • Personal data: Photos, contacts, calendar entries, notes, and location history
  • Browser data: Safari history, cookies, and saved form data
  • System information: Device details, installed apps, signed-in accounts, and connectivity information
  • iCloud Drive files: Documents synced through Apple's cloud storage

GHOSTKNIFE and GHOSTSABER (used by UNC6748 and PARS Defense respectively) have similar capabilities, with GHOSTSABER adding backdoor functionality that allows attackers to execute arbitrary code remotely and potentially activate the device microphone.

For a business, a single compromised employee iPhone could expose client communications, financial records, authentication tokens for corporate systems, and strategic documents - all without anyone knowing it happened.

What DarkSword steals in seconds Compromised iPhone Credentials Usernames, passwords, keys Crypto wallets Wallet apps, private keys Messages iMessage, Telegram, WhatsApp Email + SMS Full inbox, call history Browser data Safari history, cookies Photos + location Camera roll, GPS history iCloud Drive Synced documents, files System info Apps, accounts, device ID Exfiltrated to attacker C2 server Data staged, exfiltrated over HTTPS, then malware self-destructs
🛡️
How to Protect Your Business
Immediate steps every Houston business should take right now.

Apple has patched all six DarkSword vulnerabilities across multiple iOS releases. CISA added CVE-2026-20700 to its Known Exploited Vulnerabilities catalog, mandating federal agency remediation by March 5, 2026. Here's what you need to do:

  • Update every iPhone to iOS 26.3.1 (preferred) or iOS 18.7.6. These are the latest releases containing patches for all six vulnerabilities. Do not wait for users to update on their own - enforce it through device management policies.
  • Enable Lockdown Mode on high-risk devices. Apple's Lockdown Mode significantly reduces the attack surface by disabling certain features exploited by DarkSword, including JIT compilation in Safari. Executives, financial staff, and anyone handling sensitive data should enable it.
  • Audit your device inventory. Know exactly which iOS versions are running across your organization. Any device on iOS 18.4 through 18.7 that hasn't been updated is a potential entry point.
  • Implement mobile device management (MDM). MDM solutions let you enforce OS version requirements, block non-compliant devices from corporate resources, and push updates remotely. Without MDM, you're relying on every employee to update their phone voluntarily.
  • Review browser history for compromise indicators. Because DarkSword doesn't clean up Safari's browser history or WebKit databases, forensic tools can identify visits to known malicious domains. iVerify has published indicators of compromise.
  • Block known DarkSword domains. Google has added domains involved in DarkSword delivery to Safe Browsing. Ensure your network security infrastructure is configured to leverage these blocklists.

If you don't have a way to verify which iOS versions your employees are running, that's a gap that needs to be closed today - not next quarter.

DarkSword protection checklist
Update all iPhones to iOS 26.3.1 or 18.7.6critical
Patches all 6 DarkSword CVEs. Do not rely on users to self-update. Push via MDM or manual enforcement today.
Enable Lockdown Mode on high-risk devicescritical
Disables JIT compilation in Safari, reducing the attack surface DarkSword exploits. Priority for executives, finance, and anyone handling sensitive client data.
Audit your device inventory for vulnerable iOS versionshigh
Identify every device running iOS 18.4 through 18.7. Any unpatched device is a potential entry point to your business network, email, and cloud apps.
Deploy mobile device management (MDM)high
Enforce minimum OS version requirements, push updates remotely, and block non-compliant devices from corporate resources automatically.
Review browser history for compromise indicatorsmedium
DarkSword doesn't clean Safari history or WebKit databases. Forensic tools and iVerify's published IOCs can identify visits to known malicious domains.
Block known DarkSword delivery domainsmedium
Google added DarkSword infrastructure to Safe Browsing. Configure DNS filtering and firewall rules to use updated threat intelligence blocklists.
🔧
How CinchOps Can Help
Protecting Houston businesses from mobile threats with hands-on IT support.

CinchOps is a managed IT services provider based in Katy, Texas, serving small and mid-sized businesses across the Houston metro area. CinchOps specializes in cybersecurity, network security, managed IT support, VoIP, and SD-WAN for businesses with 10-200 employees.

Threats like DarkSword are exactly why mobile security can't be an afterthought. Here's how we help:

  • Mobile Device Management (MDM) deployment and enforcement: We configure and manage MDM policies that require minimum OS versions, push updates automatically, and block non-compliant devices from accessing corporate email, apps, and networks.
  • Patch management across all endpoints: iPhones, iPads, Windows machines, Macs - we track every device in your fleet and ensure critical security patches are applied within defined SLAs, not whenever someone gets around to it.
  • Network-level threat blocking: We configure DNS filtering, web content filtering, and firewall rules that block known malicious domains - including those associated with DarkSword delivery infrastructure.
  • Security awareness training: While DarkSword is a watering hole attack (not a phishing email), training your team to recognize when something doesn't look right and to report suspicious behavior is still a critical layer of defense.
  • Incident response support: If you suspect a device has been compromised, we help investigate, contain the damage, and remediate - fast.
  • Ongoing vulnerability monitoring: We track CISA KEV additions, vendor advisories, and threat intelligence feeds so you don't have to. When something like DarkSword drops, we're already working on your response plan.

In 30 years of managing IT - including time at Cisco and running networks for energy companies - the pattern I see most often is businesses that assume iPhones are inherently secure. They're not. They're targets, and DarkSword proves it. The businesses that stay protected are the ones that treat mobile devices with the same rigor they apply to their servers and workstations.

DarkSword threat to CinchOps Response Threat Vector CinchOps Response Unpatched iPhones iOS 18.4-18.7 still running MDM + patch management Enforce OS versions, push updates Watering hole sites Malicious iframes on real sites Network threat blocking DNS filtering, domain blocklists Employee device risk Personal phones on corp Wi-Fi Security awareness training Report suspicious behavior Active compromise Data exfiltrated in seconds Incident response Investigate, contain, remediate Future zero-days Next DarkSword is a matter of when Vulnerability monitoring CISA KEV, vendor advisories, feeds CinchOps: managed IT and cybersecurity for Houston businesses with 10-200 employees 281-269-6506 | cinchops.com/contact
Frequently Asked Questions

What is the DarkSword iOS exploit and how does it work?

DarkSword is a full iOS exploit chain that targets iPhones running iOS 18.4 through 18.7. It uses six vulnerabilities, three exploited as zero-days, to fully compromise devices through compromised websites. Once triggered, it steals credentials, messages, photos, crypto wallet data, and more within seconds before removing itself.

How many iPhones are affected by DarkSword?

According to iVerify, approximately 221.5 million devices running iOS 18.4 through 18.6.2 are believed to be directly vulnerable, representing about 14.2% of all iOS users. If all iOS 18 versions are susceptible, the number could reach 296 million devices - nearly 19% of all iPhones worldwide.

How can I protect my iPhone and business devices from DarkSword?

Update all iPhones immediately to iOS 26.3.1 or iOS 18.7.6, which contain patches for all six DarkSword vulnerabilities. Enable Lockdown Mode on devices belonging to high-risk personnel. A managed IT services provider can enforce update policies across your organization and monitor for indicators of compromise.

Who is behind the DarkSword attacks?

Multiple threat actors have used DarkSword since November 2025. These include UNC6353 (a suspected Russian espionage group targeting Ukraine), UNC6748 (targeting Saudi Arabian users), and customers of PARS Defense (a Turkish commercial surveillance vendor targeting users in Turkey and Malaysia). The exploit is available on a secondary market, meaning additional groups likely have access.

Does DarkSword require users to click anything to be infected?

DarkSword uses a watering hole method where malicious code is injected into legitimate websites. Simply visiting a compromised website with Safari on a vulnerable iPhone triggers the exploit chain. It requires only one click - the initial page visit - making it extremely difficult to detect or prevent without up-to-date software.

100% Free

Know Your Business Security Score

Get a FREE comprehensive security assessment for your Houston area business. Understand vulnerabilities across your network, applications, DNS, and more.

Discover More

Sources

Take Your IT to the Next Level!

Book A Consultation for a Free Managed IT Quote

281-269-6506