{"id":4954,"date":"2026-03-14T22:02:32","date_gmt":"2026-03-14T22:02:32","guid":{"rendered":"https:\/\/conservative-politics.com\/index.php\/2026\/03\/14\/new-hack-poses-biggest-iphone-threat-in-19-years-what-you-can-do\/"},"modified":"2026-03-14T22:02:32","modified_gmt":"2026-03-14T22:02:32","slug":"new-hack-poses-biggest-iphone-threat-in-19-years-what-you-can-do","status":"publish","type":"post","link":"https:\/\/conservative-politics.com\/index.php\/2026\/03\/14\/new-hack-poses-biggest-iphone-threat-in-19-years-what-you-can-do\/","title":{"rendered":"New hack poses biggest iPhone threat in 19 years: What you can do"},"content":{"rendered":"<div>\n<p>Apple has had a hard time lately with critical exploits plaguing iPhones all around the world. In mid-February, Google\u2019s Threat Analysis Group discovered a <a href=\"https:\/\/www.theblaze.com\/return\/apple-issues-a-critical-software-update-for-iphone-install-it-now\" target=\"_self\"><u>critical zero-day vulnerability in Apple\u2019s iOS software<\/u><\/a> that gave hackers full control of a \u201csmall subset\u201d of targeted iPhones. This month, reports revealed that an entire exploit tool kit has been successfully used by hackers in Russia and China. The worst part is that mounting evidence suggests the kit came from the United States, possibly even from our very own government.<\/p>\n<h2>Chock-full of vulnerabilities<\/h2>\n<p>According to <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/coruna-powerful-ios-exploit-kit\" rel=\"noopener noreferrer\" target=\"_blank\"><u>Google\u2019s full report<\/u><\/a>, the exploit tool kit \u2014 dubbed Coruna \u2014 consists of five exploit chains and 23 exploits in total, all targeted at iPhones running iOS 13 to iOS 17.2.1. Mobile security experts at iVerify corroborated the report, claiming that <a href=\"https:\/\/cyberscoop.com\/coruna-ios-exploit-kit-leaked-us-framework\/\" rel=\"noopener noreferrer\" target=\"_blank\"><u>42,000 iPhones were affected<\/u><\/a>.<\/p>\n<p class=\"pull-quote\">Are there more zero-day vulnerabilities in iOS that we don\u2019t know about? Almost certainly yes.<\/p>\n<p>An exploit chain is the path a hacker can use to bypass a device\u2019s security controls via exploits to gain access. In other words, if your phone\u2019s software was a map, an exploit chain is the route a driver could take through different toll areas to reach the final destination. Even one exploit chain \u2014 or route \u2014 is enough to break into a device, but the fact that <em><em>five<\/em><\/em> routes exist within Coruna makes it a sophisticated hacking resource unlike anything security researchers have seen on iOS.<\/p>\n<p>Google notes that Coruna has already been exploited by a \u201ccustomer of a surveillance company,\u201d as well as foreign nations, namely China and Russia. More alarming than that, however, \u201cmultiple threat actors\u201d have also gained access to exploit techniques that can be customized to leverage new and unknown vulnerabilities for future attacks.<\/p>\n<p class=\"shortcode-media shortcode-media-rebelmouse-image\">                                <small class=\"image-media media-photo-credit\" placeholder=\"Add Photo Credit...\">Image credit: Google<\/small><\/p>\n<h2>Where did Coruna come from?<\/h2>\n<p>Now that Coruna is out in the open, it only makes sense to wonder where it came from. Its sophisticated nature makes it highly unlikely that an independent hacker threw it together. Instead, several pieces of evidence point toward government intervention.<\/p>\n<p>For starters, the tool kit\u2019s source materials are all written in native English, suggesting English origins. Second, two of the exploits in the chain are linked directly to <a href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/kaspersky-discloses-iphone-hardware-feature-vital-in-operation-triangulation-case\" target=\"_blank\"><u>Operation Triangulation<\/u><\/a>, a hardware vulnerability discovered in Apple\u2019s first-party processing chips by Russian cybersecurity company Kaspersky. Russian government officials blamed the NSA for this exploit back in 2023, but the U.S. government denied any connection. <\/p>\n<p>Third, iVerify\u2019s co-founder and COO, Rocky Cole, reportedly called Coruna\u2019s code \u201csuperb,\u201d going on to state, \u201cIt was elegantly written. It\u2019s fluid and holds together very well. There were comments in the code that, as someone who\u2019s been around the U.S. defense industrial base for years, really are reminiscent of the sort of insider jokes and insider remarks that you might see from a U.S. based coder. Certainly they were native English language speakers.\u201d<\/p>\n<p>For what it\u2019s worth, <a href=\"https:\/\/www.theregister.com\/2026\/03\/04\/kaspersky_dismisses_claims_that_coruna\/\" target=\"_blank\"><u>Kaspersky recently denied that Coruna is linked to the NSA<\/u><\/a>, despite the evidence outlined above. Regardless of the tool kit\u2019s origin, researchers are unsure how it made it into the hands of foreign entities.<\/p>\n<p><strong>RELATED: <a href=\"https:\/\/www.theblaze.com\/return\/apple-issues-a-critical-software-update-for-iphone-install-it-now\" target=\"_blank\">Apple issues a critical software update for iPhone. Install it now!<\/a><\/strong><\/p>\n<p class=\"shortcode-media shortcode-media-rebelmouse-image image-crop-16x9\">        <img loading=\"lazy\" decoding=\"async\" id=\"e71ee\" data-rm-shortcode-id=\"63abbb73db391f10e9f3e78ea72af284\" data-rm-shortcode-name=\"rebelmouse-image\" class=\"rm-shortcode rm-lazyloadable-image \" lazy-loadable=\"true\" src=\"https:\/\/www.theblaze.com\/media-library\/image.jpg?id=65284717&amp;width=1245&amp;height=700&amp;quality=50&amp;coordinates=0%2C31%2C0%2C76\" width=\"1245\" height=\"700\" alt=\" \"\/>                        <small class=\"image-media media-photo-credit\" placeholder=\"Add Photo Credit...\">Photo by Matt Cardy\/Getty Images<\/small><\/p>\n<h2>Bigger signs of Apple\u2019s compromised security<\/h2>\n<p>Apple\u2019s iOS mobile platform is notoriously hard for hackers to crack, thanks to its closed nature, often <a href=\"https:\/\/time.com\/3437222\/iphone-data-encryption\/\" target=\"_blank\"><u>frustrating U.S. criminal investigation agencies<\/u><\/a> with its strong end-to-end encryption practices. The Coruna tool kit, however, changes everything. It\u2019s the biggest collection of exploits to hit iOS since its inception in 2007. It\u2019s also part of a growing trend that undermines Apple\u2019s once-impenetrable software security and privacy protocols.<\/p>\n<p>Just last month, <a href=\"https:\/\/www.theblaze.com\/return\/apple-issues-a-critical-software-update-for-iphone-install-it-now\" target=\"_self\"><u>Apple released iOS 26.3<\/u><\/a> to patch a critical zero-day vulnerability dubbed CVE-2026-20700. Although this remains to be a major threat to iPhone users, this exploit is <em><em>not<\/em><\/em> part of the Coruna tool kit. These are completely independent issues. Are there more zero-day vulnerabilities in iOS that we don\u2019t know about? Almost certainly yes.<\/p>\n<h2>Tips to secure your device<\/h2>\n<p>That doesn\u2019t mean there\u2019s nothing you can do. As software vulnerabilities become more prevalent, the best way to keep your devices safe and secure is to make sure you always have the latest iOS updates downloaded and installed on your phone, tablet, and laptop.<\/p>\n<p>The exploits in the Coruna tool kit that plagued iOS 13 through 17.2.1, as well as CVE-2026-20700 for iOS 26, have all been patched. If you haven\u2019t updated your iPhone to the newest software, or if you\u2019re not sure which version you have, check for updates by opening the Settings app. Then go to General, Software Update, and make sure you\u2019re on one of these versions, depending on your phone\u2019s model:<\/p>\n<ul class=\"ee-ul\">\n<li>iOS 26.3.1 (iPhone 11 and up);<\/li>\n<li>iOS 18.7.5 (Phone XS, XS Max, and XR);<\/li>\n<li>iOS 16.7.14 (iPhone 8, 8 Plus, and X);<\/li>\n<li>iOS 15.8.6 (iPhone 6s and 7); or<\/li>\n<li>iOS 12.5.8 (iPhone 5s, 6, 6 Plus).<\/li>\n<\/ul>\n<p>If you want even <em><em>more<\/em><\/em> protection from exploits and vulnerabilities, you can secure your private data with <a href=\"https:\/\/support.apple.com\/guide\/iphone\/use-advanced-data-protection-iph584ea27f5\/ios\" rel=\"noopener noreferrer\" target=\"_blank\"><u>Apple\u2019s Advanced Data Protection<\/u><\/a> built directly into iCloud. Then for maximum protection, Apple offers <a href=\"https:\/\/support.apple.com\/en-us\/105120\" rel=\"noopener noreferrer\" target=\"_blank\"><u>Lockdown Mode<\/u><\/a>, though this feature isn\u2019t meant for everybody. Since it will ultimately restrict many of the features and functions of your device, it\u2019s only meant for high-profile cyber-criminal targets like politicians, celebrities, and investigative journalists.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Apple has had a hard time lately with critical exploits plaguing iPhones all around the world. In mid-February, Google\u2019s Threat Analysis Group discovered a critical zero-day vulnerability in Apple\u2019s iOS software that gave hackers full control of a \u201csmall subset\u201d of targeted iPhones. This month, reports revealed that an entire exploit tool kit has been [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4955,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":{"0":"post-4954","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-conservative-news"},"_links":{"self":[{"href":"https:\/\/conservative-politics.com\/index.php\/wp-json\/wp\/v2\/posts\/4954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conservative-politics.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/conservative-politics.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/conservative-politics.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/conservative-politics.com\/index.php\/wp-json\/wp\/v2\/comments?post=4954"}],"version-history":[{"count":0,"href":"https:\/\/conservative-politics.com\/index.php\/wp-json\/wp\/v2\/posts\/4954\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conservative-politics.com\/index.php\/wp-json\/wp\/v2\/media\/4955"}],"wp:attachment":[{"href":"https:\/\/conservative-politics.com\/index.php\/wp-json\/wp\/v2\/media?parent=4954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/conservative-politics.com\/index.php\/wp-json\/wp\/v2\/categories?post=4954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/conservative-politics.com\/index.php\/wp-json\/wp\/v2\/tags?post=4954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}