Back to Home
Technologydb#2459

Leaked iPhone hacking tool exposes Apple’s zero-click blind spot

(2d ago)
Melbourne, Florida, United States
techcrunch.com
Leaked iPhone hacking tool exposes Apple’s zero-click blind spot

Leaked iPhone hacking tool exposes Apple’s zero-click blind spot📷 Published: Apr 13, 2026 at 04:24 UTC

  • DarkSword exploit leaks, no patch in sight
  • Zero-click attacks bypass all user defenses
  • Security researchers vs. Apple’s slow response cycle

Security researchers have uncovered two advanced iPhone hacking tools—Coruna and DarkSword—with the latter now circulating online. Unlike garden-variety malware, these tools reportedly enable zero-click exploits, meaning users don’t even need to tap a link to get compromised. The leak suggests attackers may already be probing vulnerabilities in iOS versions that Apple hasn’t patched—or perhaps can’t patch without breaking core functionality.

Apple’s ecosystem has long traded on its reputation for security, but this leak underscores a growing tension: the company’s slow patch cycles clash with the speed at which exploits spread. While Coruna remains under wraps, DarkSword’s public availability means hackers now have a blueprint to reverse-engineer attacks. Early signals suggest these tools target high-value individuals—journalists, executives, activists—but the leak democratizes the risk.

The practical impact is immediate. Users with unpatched devices (and that’s most of them) face invisible threats. Unlike Android’s fragmented update system, Apple controls iOS updates centrally—yet even that hasn’t prevented this gap. The question isn’t whether your iPhone is vulnerable, but whether the exploit has already been weaponized against you.

The gap between discovery and protection just got wider

The gap between discovery and protection just got wider📷 Published: Apr 13, 2026 at 04:24 UTC

The gap between discovery and protection just got wider

For enterprises and governments, this leak is a five-alarm fire. Zero-click exploits undermine mobile device management (MDM) tools, which assume the OS itself is secure. If DarkSword’s capabilities include persistent access—say, via iMessage or iCloud sync—IT teams may need to rethink their entire security posture. The MITRE ATT&CK framework doesn’t even fully catalog these kinds of iOS-specific threats yet.

Apple’s response will be scrutinized. The company has historically downplayed similar vulnerabilities until forced into action by public pressure or lawsuits. This time, the leak’s visibility may accelerate a fix—but the damage is already spreading. Forum chatter among security researchers, per TechCrunch’s reporting, suggests Coruna could be even more sophisticated. If that tool leaks next, we’re looking at a cascade failure of iOS trust.

The real bottleneck isn’t the exploit itself, but Apple’s opacity. Without clear disclosure timelines or bug bounty transparency, users and admins are flying blind. The company’s walled garden only works if the walls hold.

The real signal here is whether Apple will treat this as a PR problem or a systemic one. Will they accelerate patch cycles, open their bounty program, or double down on secrecy? And if they don’t act, how long until regulators force their hand?

iPhoneAppleCybersecurityHacking
// liked by readers

//Comments

AIAI Proxy Hack Exposes New Attack Vector on Cloud AIRoboticsBaidu robotaxis grounded: China’s traffic chaos exposes real-world limitsAIDisney’s $1B AI bet collapses before the first frameMedicineInflammation’s Epigenetic Scars May Linger, Raising Colon Cancer RiskAIMistral’s tiny speech model fits on a watch—so what?MedicineAutism Gene StudyAIConntour Raises $7MMedicineBrain aging’s genetic map: AI hype vs. Alzheimer’s realityAIPorn’s AI Clones Aren’t Immortal—Just Better PackagedMedicine$100M federal bet on joint regeneration—what the trials can (and can’t) proveAIGitHub’s Copilot data grab: opt-out or be trainedMedicineRNA Sequencing UnifiesAIAI’s dirty little secret: secure by default is a mythSpaceEarth Formed From Inner Solar SystemAI$70M for AI code verification—because shipping works, not just generating itSpaceYouTube’s AI cloning tool exposes a deeper problemGamingNvidia’s AI art war: Why players are sharpening the pitchforksSpaceSmile Mission to X-Ray Earth’s Magnetic ShieldTechnologyLeaked iPhone hacking tool exposes Apple’s zero-click blind spotSpaceGamma Cas’s X-Ray Mystery Solved After 40 YearsAIAI Proxy Hack Exposes New Attack Vector on Cloud AIRoboticsBaidu robotaxis grounded: China’s traffic chaos exposes real-world limitsAIDisney’s $1B AI bet collapses before the first frameMedicineInflammation’s Epigenetic Scars May Linger, Raising Colon Cancer RiskAIMistral’s tiny speech model fits on a watch—so what?MedicineAutism Gene StudyAIConntour Raises $7MMedicineBrain aging’s genetic map: AI hype vs. Alzheimer’s realityAIPorn’s AI Clones Aren’t Immortal—Just Better PackagedMedicine$100M federal bet on joint regeneration—what the trials can (and can’t) proveAIGitHub’s Copilot data grab: opt-out or be trainedMedicineRNA Sequencing UnifiesAIAI’s dirty little secret: secure by default is a mythSpaceEarth Formed From Inner Solar SystemAI$70M for AI code verification—because shipping works, not just generating itSpaceYouTube’s AI cloning tool exposes a deeper problemGamingNvidia’s AI art war: Why players are sharpening the pitchforksSpaceSmile Mission to X-Ray Earth’s Magnetic ShieldTechnologyLeaked iPhone hacking tool exposes Apple’s zero-click blind spotSpaceGamma Cas’s X-Ray Mystery Solved After 40 Years
⊞ Foto Review