Back to Intelligence

Coruna iOS Exploit Kit Exposes 23 Vulnerabilities Targeting Millions of iPhones

SA
Security Arsenal Team
March 4, 2026
5 min read

The perception of Apple’s iOS as an impenetrable fortress took a significant hit this week with the revelation of a sophisticated new threat. Google’s Threat Intelligence Group (GTIG) has disclosed details on "Coruna" (also known as CryptoWaters), a powerful and modular exploit kit specifically designed to compromise iPhones. This discovery serves as a stark reminder that no platform is immune from determined, well-resourced threat actors.

The Coruna Toolkit: A New Level of Mobile Sophistication

While mobile malware is common, a full-fledged exploit kit for iOS is rare and dangerous. Typically associated with desktop ecosystems, exploit kits streamline the attack process by testing a target for multiple vulnerabilities automatically until one succeeds. Coruna takes this concept to the mobile realm.

According to the GTIG report, Coruna is not a single tool but a comprehensive arsenal. It features five distinct exploit chains comprising a total of 23 different exploits. These chains target Apple devices running iOS versions ranging from 13.0 to 17.2.1. The sheer breadth of this coverage suggests the developers invested significant resources in acquiring and weaponizing zero-day and n-day vulnerabilities over several years.

Technical Analysis and Attack Vectors

The modularity of Coruna allows threat actors to dynamically select the appropriate exploit chain based on the target's iOS version. This "one-stop-shop" approach lowers the barrier to entry for sophisticated espionage campaigns. By including exploits spanning four major iterations of iOS (13 through 17), the kit ensures a high success rate against a massive installed base of devices that have not been updated to the absolute latest firmware.

While the specific delivery vector (e.g., Safari drive-by download or phishing messaging app) was not fully detailed in the initial disclosure, the presence of full exploit chains implies the capability for remote code execution (RCE) and privilege escalation. Once an initial exploit gains a foothold, the chain typically escalates privileges to bypass the iPhone's sandbox and kernel protections, effectively taking full control of the device.

It is crucial to note that Apple has patched the vulnerabilities exploited by Coruna in versions later than iOS 17.2.1. However, the existence of this kit poses a severe risk to organizations that allow Bring Your Own Device (BYOD) policies without strict update enforcement.

Threat Hunting and Detection

Hunting for iOS exploit kits is challenging due to the closed nature of the ecosystem. However, Security Arsenal analysts recommend the following queries to identify devices running vulnerable firmware versions within your enterprise mobility management (EMM) or endpoint logging systems.

1. KQL Query for Sentinel/Defender

If you are ingesting mobile device logs into Microsoft Sentinel or using Defender for Endpoint, use this query to flag vulnerable iOS versions (13.0.0 – 17.2.1):

Script / Code
DeviceInfo
| where OSPlatform == "iOS" or OSPlatform == "iPhoneOS"
| extend OSVersionParsed = todynamic(OSVersion)
| where tostring(OSVersionParsed[0]) in ("13", "14", "15", "16") or 
        (tostring(OSVersionParsed[0]) == "17" and 
         (tosint(OSVersionParsed[1]) < 2 or 
          (tosint(OSVersionParsed[1]) == 2 and toint(OSVersionParsed[2]) <= 1)))
| project DeviceName, OSVersion, DeviceId, LastSeen
| order by LastSeen desc

2. Python Script for Version Auditing

Use this Python script to audit a CSV export of your mobile inventory against the vulnerable range:

Script / Code
import csv
import re

def parse_ios_version(version_str):
    """Parses iOS version string into a tuple of integers."""
    match = re.match(r'(\d+)\.(\d+)\.?(\d+)?', version_str)
    if not match:
        return None
    major = int(match.group(1))
    minor = int(match.group(2))
    patch = int(match.group(3)) if match.group(3) else 0
    return (major, minor, patch)

def is_vulnerable(version_tuple):
    """Checks if the version is between 13.0.0 and 17.2.1 inclusive."""
    if not version_tuple:
        return False
    major, minor, patch = version_tuple
    
    # Check if lower than 13 (Safe)
    if major < 13:
        return False
    # Check if higher than 17.2.1 (Safe)
    if major > 17:
        return False
    if major == 17:
        if minor > 2:
            return False
        if minor == 2 and patch > 1:
            return False
    return True

# Simulate reading a CSV file 'device_inventory.csv'
# with columns 'device_id', 'os_version'
input_file = 'device_inventory.csv'

try:
    with open(input_file, mode='r', encoding='utf-8-sig') as infile:
        reader = csv.DictReader(infile)
        print(f"{'Device ID':<20} | {'OS Version':<10} | {'Status':<10}")
        print("-" * 45)
        for row in reader:
            ver_str = row.get('os_version', 'Unknown')
            v_tuple = parse_ios_version(ver_str)
            if is_vulnerable(v_tuple):
                print(f"{row['device_id']:<20} | {ver_str:<10} | {'VULNERABLE':<10}")
except FileNotFoundError:
    print(f"Error: {input_file} not found.")

Mitigation Strategies

The mitigation for the Coruna exploit kit is straightforward but operationally difficult for many organizations:

  1. Immediate Patching: Ensure all iPhone devices are updated to the latest version of iOS. Since Coruna is ineffective against the latest release, updating neutralizes the threat immediately.
  2. MDM Compliance Policies: Configure your Mobile Device Management (MDM) solution to block access to corporate resources (Exchange, SharePoint, VPN) if the OS version is below the minimum threshold (e.g., iOS 17.3 or higher).
  3. Network Segmentation: Treat mobile devices as untrusted until they prove compliance. Isolate BYOD devices on a guest network that does not have access to critical internal servers.

Related Resources

Security Arsenal Managed SOC Services AlertMonitor Platform Book a SOC Assessment soc-mdr Intel Hub

socthreat-intelmanaged-sociosexploit-kitmobile-securityvulnerability-management

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.