Google reveals iPhone cryptocurrency attack toolkit "Coruna," capable of stealing seed phrases and wallet information

March 5 News: Google Threat Intelligence Group (GTIG) recently released a security report stating that researchers have discovered a new iPhone exploit toolkit called “Coruna,” used to steal cryptocurrency wallet mnemonics and financial information. The toolkit targets devices running iOS 13.0 to 17.2.1 and launches targeted attacks through multiple exploit chains, drawing significant attention in the mobile security field.

The report shows that “Coruna” contains five complete iOS exploit chains, involving a total of 23 security vulnerabilities, some of which have never been publicly disclosed before. Google researchers said they first identified related attack activity in February 2025 and found that the tool was initially suspected to be used by Russian espionage groups for cyberattacks against Ukrainian users. It was later used to impersonate financial and crypto-related websites to trick users into revealing information.

The attack mainly relies on malicious web pages delivering exploit code. When iPhone users visit specific sites, JavaScript frameworks on the pages perform device fingerprinting, verify the system version, and then load the corresponding exploit chain. Researchers found the same framework on multiple compromised Ukrainian websites and noted that the attack code was only sent to iPhones in certain regions.

In December 2025, the team further detected the same framework on numerous fake Chinese-language websites related to financial services, including counterfeit crypto platform pages. Once victims access these sites on iOS devices, the tools scan for sensitive information such as mnemonic phrases, backup words, or bank account details, and attempt to read data from common crypto wallet apps to gain control of digital assets.

Google states that this exploit toolkit currently cannot run on the latest iOS versions, and recommends iPhone users upgrade their systems promptly. If upgrading is not possible, users can enable Apple’s “Lockdown Mode” to defend against complex network attacks.

Meanwhile, discussions about the origin of “Coruna” have also sparked controversy. Rocky Cole, co-founder of mobile security firm iVerify, told media that the tool is highly complex, with development costs possibly reaching millions of dollars, and shares some modules similar to those used in U.S. government cyber tools. However, Kaspersky security experts said there is currently not enough evidence to directly link its code to any known tools.

Security experts warn that cryptocurrency users should be vigilant against phishing pages and update their devices promptly when using mobile wallets or visiting related websites to reduce the risk of mnemonic leaks and digital asset theft.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Orca Responds to Vercel Security Incident: Frontend Credentials Rotated, On-Chain Funds Unaffected

Orca, the Solana liquidity protocol, addressed a security incident at its hosting provider, Vercel, by rotating compromised keys. They confirmed that user funds were unaffected and will provide updates as the situation evolves.

GateNews37m ago

Kelp DAO Bridge Exploit Results in $293M Mint, Leaves Aave With Over $200M in Bad Debt

An attacker exploited a vulnerability in Kelp DAO's cross-chain bridge, stealing $293 million in unbacked rsETH. The incident caused significant losses for DeFi platforms, with Aave facing up to $236 million in bad debt and substantial impacts on the market.

GateNews5h ago

Expert Claims Altcoin Metrics Are Being 'Gamed' to Mislead Investors

Crypto researcher Orbion raises concerns over the possible manipulation of key market indicators, including the Altseason Index and Crypto Fear and Greed Index, suggesting that inflated metrics create false optimism and mislead investors about the onset of altcoin season.

Coinpedia9h ago

Curve Finance Suspends LayerZero Infrastructure Following rsETH Hack

Curve Finance has temporarily suspended its LayerZero infrastructure due to a security incident involving rsETH. The protocol is investigating the issue, affecting certain cross-chain bridging operations while others continue as normal.

GateNews10h ago

KelpDAO Exploiter Borrows $195M ETH from Aave, TVL Drops $6.28B as Whales Withdraw

Gate News message, the KelpDAO exploiter borrowed over 82,600 ETH ($195M) from Aave using RSETH as collateral, resulting in bad debt appearing on Aave. Following this incident, numerous whales withdrew funds from Aave, causing its TVL to decline from $26.396B to $20.114B, a decrease of $6.28B.

GateNews13h ago

Monad Co-Founder Suggests Dynamic Caps on Collateral Deposits to Mitigate Hacking Risks

Keone Hon suggests that pooled lending protocols should implement gradual rate limits on collateral asset increases to mitigate risks during hacks. He argues this could have prevented significant losses, as seen with rsETH depositors.

GateNews16h ago
Comment
0/400
No comments