iPhone users beware! Google warns: Coruna attack toolkit is rampant, exclusively stealing cryptocurrencies

UNI-1,14%

Google Reveals Coruna iOS Suite Contains 23 Vulnerabilities, Leaking from State Surveillance Tools into the Black Market, Targeting iPhone Encrypted Assets and Stealing Private Keys via Zero-Click Attacks.

Evolving from State-Level Surveillance Tools to “Asset Harvesters”

According to an in-depth report released by Google Threat Intelligence Group (GTIG), the iOS vulnerability suite codenamed Coruna (also known as CryptoWaters) poses a serious threat to iPhone users worldwide. The development of this tool has a highly dramatic history. First discovered in February 2025, it was provided by private surveillance vendors to government clients for targeted monitoring of politicians and dissidents. Later, in summer 2025, a hacker group linked to the Russian government, UNC6353, took control of the suite and used it for geopolitical espionage against Ukrainian citizens.

Image Source: Google Timeline of Coruna Discovery

As the technology leaked out, this professionally developed tool, costing millions of dollars, has officially entered the cybercrime market. Between late 2025 and early 2026, a Chinese hacking group, UNC6691, acquired the technology and shifted its focus toward digital asset theft. This marks the commodification of high-level espionage tools, transforming from targeted intelligence gathering to large-scale theft of cryptocurrency holdings. Researchers note that hackers are willing to invest significant technical resources, indicating that the enormous profits behind crypto assets drive professional-grade tools into financial crime.

Chain Reaction of 23 Vulnerabilities: Silent Penetration Behind the “Watering Hole”

Coruna features a high degree of automation and stealth, integrating 23 separate vulnerabilities that form five complete attack chains. Its impact is extensive, affecting all iPhones and iPads running iOS 13.0 through iOS 17.2.1. The hackers employ a covert “watering hole attack,” infiltrating or setting up fake cryptocurrency exchanges and financial websites to lure victims. These sites, such as counterfeit WEEX trading platforms, look and function almost identically to official sites, even using SEO and paid ads to increase exposure.

Image Source: Google Fake WEEX Trading Platform

When iPhone users visit these compromised sites, background scripts immediately execute device recognition. The system silently checks the iOS version, and if the device falls within the targeted range, it automatically triggers zero-click vulnerabilities, allowing full infiltration without any user interaction or clicking download links. Some fake sites even prompt users to browse with iOS devices, claiming better experience, but in reality, they are precisely targeting unpatched, vulnerable systems.

Even Screenshots in Photo Albums Are Not Safe

Once Coruna gains control of the device, its malicious component PlasmaLoader activates, inventorying the user’s digital assets. This program has powerful scanning capabilities, actively searching for keywords like “backup phrase,” “bank account,” or “seed phrase,” and extracting key data from SMS and notes. It also features image recognition, automatically scanning screenshots in the user’s photo albums for QR codes containing wallet seed phrases or private keys.

Beyond static data collection, Coruna targets popular crypto wallet apps like MetaMask and Uniswap. Hackers attempt to extract sensitive information from these apps to gain full control of wallets. In multiple known cases, victims’ funds were transferred shortly after visiting fake websites. Because the attack targets system-level permissions, any digital traces of private keys left on the device are vulnerable to this espionage-grade tool.

Image Source: Google List of Apps Vulnerable to Malicious Attacks

Defense Rules and Survival Tips? System Updates Are Key to Security

In the face of such sophisticated threats, iPhone users should adopt clear protective measures. Google’s report states that Coruna is ineffective against iOS 17.3 or higher. Although newer versions are available, some users with older devices or insufficient storage may not update promptly, exposing themselves to risk. For those unable to upgrade to secure versions, enabling Apple’s “Lockdown Mode” is an effective countermeasure; once malicious software detects this mode, it will cease operation to avoid detection.

Cybersecurity experts recommend that crypto holders follow basic survival rules. The primary protection is to use hardware wallets (like Ledger or Trezor), keeping private keys offline and disconnected from iOS environments. Additionally, immediately delete all screenshots containing seed phrases or private keys from photo albums and switch to offline physical backups.

Although Coruna attempts to avoid detection by bypassing incognito modes, this is only a temporary measure. As digital assets grow in value, maintaining software updates and cybersecurity vigilance has become a fundamental responsibility for every investor.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

JPMorgan: DeFi Security Exploits and Stagnant TVL Limit Institutional Adoption

Gate News message, April 23 — JPMorgan analysts led by managing director Nikolaos Panigirtzoglou said that persistent decentralized finance (DeFi) exploits and weak growth continue to limit institutional interest in the sector. The recent Kelp DAO hack wiped approximately $20 billion from DeFi's tot

GateNews5h ago

U.S. Treasury Sanctions Cambodian Senator Over Crypto Scam Network

## Overview The U.S. Treasury Department sanctioned Cambodian Senator Kok An and 28 entities associated with him on Thursday, according to the Treasury's Office of Foreign Assets Control (OFAC). The action targets what officials describe as a massive crypto scam operation in Southeast Asia. ## The

CryptoFrontier6h ago

Aave Freezes rsETH Reserves Across Five Networks Following KelpDAO Exploit

Gate News message, April 23 — Aave has frozen rsETH reserves across Ethereum Core, Arbitrum, Base, Mantle, and Linea as the recovery effort accelerates following the April 18 KelpDAO exploit that drained 116,500 rsETH, valued at approximately $292 million, from Kelp's cross-chain bridge. Multiple D

GateNews8h ago

JPMorgan: DeFi hackers are increasingly common, and interest in compression mechanisms to address TVL stagnation is drawing capital into USDT

JPMorgan Chase’s report believes that DeFi continues to face ongoing vulnerabilities, cross-chain bridge and oracle attacks are frequent, causing TVL to stagnate and weakening institutional investors’ willingness to invest, with capital shifting to USDT that is traceable and can be frozen. The KelpDAO and Rhea Finance attacks reveal risk-management risks; centralized stablecoins and custodial solutions are more favored. In the long run, improving this will require going beyond insurance and governance. DeFi will not be able to return to the 2021 era of high TVL, and stablecoins will become even more concentrated.

ChainNewsAbmedia8h ago

Circle Chief Economist Proposes Raising USDC Rates on Aave Amid KelpDAO Fallout

Gate News message, April 23 — Gordon Liao, Circle's chief economist, has proposed raising USDC lending parameters on Aave v3 Ethereum Core this week following a $292 million KelpDAO rsETH exploit that triggered a liquidity crisis across the protocol. Liao's Request for Comment suggests increasing "S

GateNews9h ago

Major CEX Upgrades Fraud Detection System with Machine Learning and Rule Engine, Cuts Response Time to Hours

Gate News message, April 23 — A major centralized exchange announced an overhaul of its anti-fraud system by integrating machine learning models with rule-based engines, implementing a dual-track strategy where models handle long-term defense and rules enable rapid response. The unified framework

GateNews9h ago
Comment
0/400
No comments