数亿部iPhone可能被新型工具入侵
Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild

原始链接: https://www.wired.com/story/hundreds-of-millions-of-iphones-can-be-hacked-with-a-new-tool-found-in-the-wild/

## DarkSword:广泛的iPhone黑客威胁浮现 一种新发现的iPhone黑客技术,名为DarkSword,对仍运行较旧iOS版本(特别是iOS 18,影响约25%的iPhone)的数百万用户构成重大风险。来自Google、iVerify和Lookout的研究人员透露,DarkSword通过受感染的网站传播,悄无声息地窃取敏感数据,如密码、消息、照片,甚至加密货币钱包凭据。 与传统的间谍软件不同,DarkSword以“无文件”方式运行,劫持合法的iPhone进程以避免检测。令人担忧的是,完整的DarkSword代码——包括文档——被不小心暴露在被入侵的乌克兰网站上,可能允许任何黑客复制攻击。 虽然与俄罗斯国家资助的间谍组织(也使用更高级的工具包Coruna)有关联,但其易用性表明威胁范围更广,超出了定向间谍活动,可能扩展到广泛的网络犯罪。苹果尚未发表评论,导致大量iPhone用户在更新到最新iOS版本之前仍处于易受攻击状态。

一种名为“DarkSword”的新型、广泛存在的iOS漏洞链能够完全攻陷运行iOS 18.4至18.7版本的iPhone。该漏洞链由谷歌威胁情报小组(GTIG)发现,利用了六个零日漏洞,并自2025年11月起被多个行为者使用,包括商业监控供应商和疑似国家支持的组织(如与俄罗斯有关的UNC6353)。 只需访问受感染的网站即可造成入侵。一旦被利用,设备可能会感染GHOSTBLADE、GHOSTKNIFE和GHOSTSABER等恶意软件家族。该漏洞的广泛应用类似于过去iOS漏洞工具包,如Coruna。 苹果已在iOS 26.3中修复了这些漏洞,并敦促用户立即更新。人们对存储在Apple Wallet中的数据安全表示担忧,因为完全攻陷设备会显著扩大威胁面,超出先前认为的隔离范围。
相关文章

原文

iPhone hacking techniques have sometimes been described almost like rare and elusive animals: Hackers have used them so stealthily and carefully against such a small number of hand-picked targets that they're only rarely seen in the wild. Now a recent spate of espionage and cybercriminal campaigns has instead deployed those same phone-takeover tools, embedded in infected websites, to indiscriminately hack phones by the thousands. And one new technique in particular—capable of taking over any of hundreds of millions of iOS devices—has appeared on the web in an easily reusable form, putting a significant fraction of the world's iPhone users at risk.

Researchers at Google and cybersecurity firms iVerify and Lookout on Wednesday jointly revealed the discovery of a sophisticated iPhone hacking technique known as DarkSword that they've seen in use on infected websites, capable of instantly and silently hacking iOS devices that visit those sites. While the technique doesn't affect the latest, updated versions of iOS, it does work against iOS devices running versions of Apple's previous operating system release, iOS 18, which as of last month still accounted for close to a quarter of iPhones, according to Apple's own count.

“A vast number of iOS users could have all of their personal data stolen simply for visiting a popular website,” says Rocky Cole, iVerify's cofounder and CEO. “Hundreds of millions of people who are still using older Apple devices or older operating system versions remain vulnerable.”

The iPhone-hacking campaign that used DarkSword has come to light just two weeks after the revelation of another, even more sophisticated and fully featured hacking toolkit known as Coruna was found in use by what Google describes as a Russian state-sponsored espionage group and other hacker groups. Although DarkSword appears to have been created by different developers from Coruna, the researchers found that it was used by those same Russian spies. Like Coruna, it too was embedded in components of otherwise legitimate Ukrainian websites, including online news outlets and a government agency site, to harvest data from visitors' phones.

Yet just as concerning, says iVerify cofounder and researcher Matthias Frielingsdorf, is that the hackers who carried out that espionage campaign left the full, unobscured DarkSword code—complete with explanatory comments in English that describe each component and include the “DarkSword" name for the tool—available on those sites for anyone to access and reuse. That carelessness, he says, practically invites other hacker groups to adopt it and target other iPhone users. “Anyone who manually grabbed all the different parts of the exploit could put them onto their own web server and start infecting phones. It's as simple as that,” says Frielingsdorf. “It's all nicely documented, also. It's really too easy.”

WIRED reached out to Apple for comment on the researchers' findings, but the company didn't provide comment. Google declined to comment beyond the blog post it released about its DarkSword findings.

According to Lookout, DarkSword is designed to steal data from vulnerable iPhones that include passwords and photos; logs from iMessage, WhatsApp, and Telegram; browser history; Calendar and Notes data; and even data from Apple's Health app. Despite the apparent espionage focus of the hacking campaign, DarkSword also steals users' cryptocurrency wallet credentials, suggesting the hackers may have carried out a possible side business in for-profit cybercrime.

Rather than install spyware that persists on users' phones, DarkSword uses stealthier techniques that are more often seen in “fileless” malware that typically target Windows devices, hijacking the legitimate processes in an iPhone's operating system to steal data. “Instead of using a spyware payload to brute force your way through the file system—which leaves tons of artifacts of exploitation that are pretty easy to detect—this just uses system processes the way they're meant to be used,” iVerify's Cole says. “And it leaves far fewer traces.”

联系我们 contact @ memedata.com