DarkSword是一种新近发现的iPhone攻击工具,仅通过访问网站即可入侵设备,将攻击规模从定向操作扩大到影响数亿设备的大规模暴露。它专门针对iOS 18,而该系统仍占接近25%的iPhone,表明存在庞大的易受攻击基数。与以往罕见的漏洞利用不同,DarkSword被无差别部署,通过受感染的合法网站感染数千设备。其代码被完整公开且附带文档,显著降低复用门槛并提高被更多攻击者复制的概率。
该工具已与俄罗斯国家相关黑客关联,并曾在至少三个国家被观察到使用:沙特、土耳其和马来西亚。它在另一工具Coruna曝光后不久出现,后者针对iOS 13–17,表明高端漏洞正在快速扩散。DarkSword包含多个针对不同iOS 18子版本的利用链,相比早期工具提升了兼容性与覆盖范围。研究人员将其扩散归因于漏洞中介市场,在该市场中工具被转售给多个行为体,使其从单一团体使用迅速扩展为多团体采用。
在技术层面,DarkSword采用无文件技术,在数分钟内提取敏感数据且几乎不留下取证痕迹,并在设备重启后失效。目标数据包括消息、凭证、照片、健康记录以及加密货币钱包,扩大了间谍活动与金融攻击面。尽管已有补丁和如Lockdown Mode等防护措施,但新系统(iOS 26)采用率较低使风险持续存在。高复用潜力、约四分之一设备暴露以及漏洞商品化加速的叠加,标志着攻击模式从稀缺高成本转向可规模化、可重复的结构性变化。
DarkSword is a newly observed iPhone exploitation tool capable of compromising devices simply through website visits, scaling attacks from targeted operations to mass exposure affecting hundreds of millions of devices. It specifically targets iOS 18, which still accounts for close to 25% of iPhones, indicating a large vulnerable base. Unlike rare prior exploits, DarkSword has been deployed indiscriminately, infecting thousands via compromised legitimate websites. Its public exposure, including fully documented code left accessible, significantly lowers reuse barriers and increases replication probability across additional threat actors.
The tool has been linked to Russian state-associated hackers and previously observed campaigns in at least three countries: Saudi Arabia, Turkey, and Malaysia. It emerged shortly after another toolkit, Coruna, which targets iOS 13–17, indicating rapid proliferation of high-end exploits. DarkSword contains multiple exploit chains tailored to different iOS 18 subversions, increasing compatibility and reach relative to earlier tools. Researchers attribute its spread to a brokered exploit market, where tools are resold across actors, amplifying distribution from single-group usage to multi-group adoption within a short timeframe.
Technically, DarkSword uses fileless techniques, extracting sensitive data within minutes and leaving minimal forensic traces, with infections ending after device reboot. Data targeted includes messages, credentials, photos, health records, and cryptocurrency wallets, expanding both espionage and financial attack surfaces. Despite available patches and protections such as Lockdown Mode, slow adoption of newer systems (iOS 26) sustains exposure. The convergence of high reuse potential, approximately one-quarter device vulnerability, and rapid exploit commoditization signals a structural shift from scarce, high-cost attacks to scalable, repeatable cyber intrusion models.