Skip to main content
Security 2 min read 236 views

Google Exposes "Coruna" iOS Exploit Kit: 23 Exploits Across Five Chains Targeting iPhones

Google's Threat Intelligence Group discloses Coruna (aka CryptoWaters), a powerful iOS exploit kit with 23 exploits across five full chains targeting iOS 13-17.2.1 — originally used by a surveillance vendor, now weaponized for cryptocurrency theft by Chinese-speaking cybercrime groups.

TD

TechDrop Editorial

Share:

Google's Threat Intelligence Group (GTIG) has disclosed Coruna, a powerful iOS exploit kit containing 23 exploits organized into five full exploit chains that target Apple iPhones running iOS versions 13.0 through 17.2.1. The kit, also tracked as CryptoWaters, represents one of the most comprehensive iOS exploit frameworks ever publicly documented.

Origin and Evolution

GTIG tracked Coruna's evolution through three distinct phases. Initially, the kit was used in "highly targeted operations" by a customer of a commercial surveillance vendor — the type of operation typically associated with government intelligence agencies. It was then observed in watering hole attacks targeting Ukrainian users by UNC6353, a suspected Russian espionage group. Most recently, in late 2025 and early 2026, a Chinese-speaking financially motivated group tracked as UNC6691 acquired the kit and pivoted its use entirely to cryptocurrency theft.

Technical Sophistication

The kit's five exploit chains include non-public exploitation techniques and mitigation bypasses that demonstrate access to advanced vulnerability research. The 23 individual exploits target various iOS components including WebKit, the kernel, and sandbox escape mechanisms. Notably, Coruna includes a self-defense mechanism: it detects and skips execution on devices running in Lockdown Mode or using private browsing — suggesting awareness of Apple's advanced security features and a desire to avoid triggering detection by security-conscious targets.

Defense Recommendations

Apple has patched the vulnerabilities exploited by Coruna in iOS 17.3 and later versions. Users running iOS 17.2.1 or earlier are vulnerable and should update immediately. Google and iVerify recommend enabling Lockdown Mode for users who face elevated threat levels, as the kit explicitly avoids devices with Lockdown Mode active. The disclosure highlights the ongoing market for iOS exploits and the lifecycle of such tools: originally developed for state-sponsored surveillance, they eventually leak or are sold to criminal groups, broadening the population of potential victims from targeted individuals to the general public.

Related Articles