BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
CIPHERThreat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
β€’
Β© 2026
β€’
blacktemple.net
  1. Feed
  2. /Russian Hackers Deploy DarkSword Zero-Day for Drive-By iOS 18 Exploitation

Russian Hackers Deploy DarkSword Zero-Day for Drive-By iOS 18 Exploitation

March 19, 2026Nation-State & APT2 min readcritical

Originally reported by WIRED Security

#ios#zero-day#russian-apt#drive-by-download#mobile-security#darksword
Share

TL;DR

Russian threat actors have been discovered using DarkSword, a sophisticated zero-day exploit that can compromise iOS 18 devices simply by visiting infected websites. The technique potentially affects hundreds of millions of iPhones currently in use.

Why critical?

Zero-day exploitation tool actively used by nation-state actors against hundreds of millions of devices via drive-by attacks represents immediate critical threat. The scale and accessibility of the attack vector (visiting infected websites) combined with confirmed active use elevates this to maximum severity.

Russian APT Deploys Zero-Day Against iOS 18 Devices

Russian threat actors are actively exploiting a previously unknown vulnerability affecting iOS 18 devices using a technique designated DarkSword, according to research published by WIRED Security. The exploit enables full device compromise through drive-by attacks that require only visiting a malicious website.

Attack Vector and Impact

DarkSword represents a significant escalation in mobile device targeting, operating as a watering hole attack that requires no user interaction beyond navigating to an infected webpage. The technique affects devices running iOS 18, potentially impacting hundreds of millions of iPhones currently deployed globally.

The discovery marks another instance of nation-state actors successfully weaponizing zero-day vulnerabilities against mobile platforms, following previous campaigns targeting both iOS and Android ecosystems.

Technical Implications

The drive-by nature of DarkSword attacks eliminates traditional user education defenses, as victims need not download applications or click suspicious links. This attack vector significantly lowers the barrier for successful exploitation and enables broad-scale targeting campaigns.

The technique's deployment by Russian operators suggests potential intelligence collection objectives, though specific targeting criteria and payload functionality remain under investigation.

Defensive Considerations

iOS device operators should prioritize applying security updates as they become available from Apple. Organizations managing mobile device fleets should consider implementing additional network-level protections and monitoring for indicators of compromise on managed devices.

The discovery underscores the continued evolution of nation-state mobile exploitation capabilities and the critical importance of maintaining current patch levels across mobile device infrastructures.

Sources

  • https://www.wired.com/story/hundreds-of-millions-of-iphones-can-be-hacked-with-a-new-tool-found-in-the-wild/

Originally reported by WIRED Security

Tags

#ios#zero-day#russian-apt#drive-by-download#mobile-security#darksword

Tracked Companies

πŸ‡ΊπŸ‡ΈApple

Related Intelligence

  • Nation-State Roundup: Russian APT Exploits Zimbra Zero-Day, Iranian Group Hits Stryker via Microsoft Intune

    highMar 20, 2026
  • Magento Under Siege: PolyShell Zero-Day Fuels Mass Defacements, AI Fraud Tactics Emerge

    highMar 21, 2026
  • Critical iOS Zero-Day Kit and Cisco FMC Ransomware Attacks Highlight AI Security Gaps

    criticalMar 19, 2026

Related Knowledge

  • Threat Intelligence Deep Training

    reference
  • MITRE ATT&CK / D3FEND Deep Reference

    reference
  • CIPHER Training: Emerging Threats Deep Dive (2025-2026)

    reference

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Snap Privilege Escalation, Snowflake AI Sandbox Escape, and Allied Nation Security Concerns

Next Article

DJI Robot Vacuum Research Exposes 7,000-Device Botnet Access β†’