DarkSword iOS Exploit: Full Device Takeover in Seconds
What is it?
A new iOS exploit kit called DarkSword is actively being used by multiple threat actors to fully compromise iPhones. Similar to the recently discovered Coruna, this exploit chain uses six vulnerabilities — including three zero-days — to gain complete control of a device.
Delivered through compromised websites (watering hole attacks), it requires little to no user interaction. Once triggered, it bypasses Safari protections, escalates privileges, and deploys malware capable of extracting sensitive data in minutes.
Why should you care?
This isn’t just another vulnerability — it’s a full-device takeover tool.
DarkSword can steal:
- Credentials and passwords
- Emails, SMS, and call history
- iCloud files and photos
- Crypto wallet data
- App data (including WhatsApp & Telegram)
- Wi-Fi credentials and location history
Even more concerning:
- It works fast (seconds to minutes)
- Leaves little to no trace (hit-and-run style)
- Is being used by state-linked and financially motivated actors
- Targets modern iOS versions (18.4–18.7)
This shows a growing trend: advanced iOS exploits are no longer limited to elite nation-state actors — they’re spreading.
What can you do?
This is where proactive security matters most:
- Update immediately
Ensure all Apple devices are running the latest patched iOS versions. - Avoid unknown or suspicious websites
These attacks rely on compromised sites to trigger silently. - Limit sensitive access on mobile devices
Especially crypto wallets and business-critical apps. - Use Mobile Device Management (MDM)
For businesses, enforce policies, updates, and monitoring. - Work with a security partner
Advanced threats like this require visibility beyond basic protections.
Bottom line
DarkSword is a clear signal that mobile devices are now prime targets for high-end cyberattacks. The speed, sophistication, and accessibility of these exploit kits are accelerating — and reactive security is no longer enough.
Britec helps organizations stay ahead of evolving threats with proactive, tailored security solutions built for today’s landscape.