Infiltrating iPhones to Steal Cryptocurrency! The Attack Suite "Coruna" Ravages, Old iOS Versions at Risk of Being Lambs

UNI1,68%

Author: Max, Crypto City

Evolving from a national surveillance tool to an “asset harvesting machine”
According to an in-depth report released by Google Threat Intelligence Group (GTIG), the iOS vulnerability suite codenamed Coruna (also known as CryptoWaters) poses a serious threat to users worldwide. The development of this tool has a highly dramatic trajectory. When first discovered in February 2025, it was provided by private surveillance vendors to government clients for targeted monitoring of politicians and dissenters. Later, in summer 2025, a hacker group linked to the Russian government, UNC6353, took control of the suite and used it for geopolitical espionage against Ukrainian citizens.

Image source: Google | Coruna Timeline

As the technology proliferated, this professionally developed tool, costing millions of dollars, has officially entered the cybercrime market. By late 2025 to early 2026, a Chinese hacker group, UNC6691, acquired the technology and shifted their attack focus to digital asset theft. This marks the commodification of high-level espionage tools, transforming from targeted intelligence gathering to large-scale theft of cryptocurrency holdings. Researchers note that hackers are willing to invest significant technical resources, indicating that the enormous profits behind crypto assets drive professional techniques into financial crime.

23 Vulnerabilities Chain Reaction: Silent Penetration Behind the “Watering Hole”
Coruna features a high degree of automation and stealth, integrating 23 independent vulnerabilities that form five complete attack chains. Its scope is extensive, affecting all iPhones and iPads running iOS 13.0 through iOS 17.2.1. The hackers employ a covert “watering hole attack,” infiltrating or setting up fake cryptocurrency exchanges and financial websites to lure victims. These sites, such as the counterfeit WEEX exchange, look and function almost identically to the real ones, even using SEO and paid ads to increase visibility.

Image source: Google | Fake WEEX Exchange

When iPhone users visit these compromised sites, background scripts immediately execute device recognition. The system silently checks the iOS version, and if the device falls within the targeted range, it automatically triggers zero-click (Zero-click) exploits, fully automated without any user interaction or clicking links. Some fake sites even proactively prompt users to browse with iOS devices, claiming better experience, but in reality, they are precisely targeting vulnerable devices that haven’t been updated.

Even screenshots in photo albums are not safe
Once Coruna successfully gains device access, its malicious component PlasmaLoader activates, conducting a scan of the user’s digital assets. This program has powerful scanning capabilities, actively searching for keywords like “backup phrase,” “bank account,” or “seed phrase,” and extracting key data from SMS and notes. It also features image recognition, automatically scanning screenshots in the user’s photo albums for QR codes containing wallet seed phrases or private keys.
In addition to static data collection, Coruna targets mainstream crypto wallet apps like MetaMask and Uniswap. Hackers attempt to extract sensitive information from these apps to gain full control of wallets. In multiple known cases, victims’ funds were transferred shortly after visiting fake websites. Because the attack targets system-level permissions, any digital traces of private keys left on the device are difficult to escape from this espionage-grade tool.

Image source: Google | Google lists all apps potentially vulnerable to malicious attacks

Defense Rules and Survival Tips? System Updates Are Key to Security
In the face of sophisticated high-level threats, iPhone users should adopt clear protective measures. Google’s report states that Coruna is completely ineffective against iOS 17.3 or higher. Although newer system versions are available, some users still run outdated devices or lack space to update, exposing themselves to risk. For older models that cannot upgrade to secure versions, enabling Apple’s “Lockdown Mode” is an effective countermeasure. Once malicious software detects this mode, it will cease operation to avoid detection.
Cybersecurity experts recommend that crypto holders follow basic survival rules. The primary protection is to use hardware wallets (such as Ledger or Trezor), keeping private keys offline and disconnected from iOS environments. Additionally, all screenshots containing seed phrases or private keys should be immediately deleted from photo albums, and offline physical backups should be used instead.
Although Coruna avoids detection by steering clear of incognito browsing modes, this is only a temporary measure. As the value of digital assets continues to rise, maintaining software updates and cybersecurity vigilance has become a fundamental responsibility for every investor.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Florida and Massachusetts Recover $5.4M in Crypto Fraud Assets from Romance Scam Scheme

Authorities in Florida and Massachusetts recovered $5.4 million in cryptocurrency from romance scam-related investment fraud, with victims receiving partial refunds. Ongoing efforts continue against crypto fraud, with additional assets under litigation.

GateNews31m ago

Crypto’s most ridiculous robbery? A hacker minted $1 billion in DOT tokens, but only stole $230k

Hackers exploited the Hyperbridge cross-chain bridge vulnerability to mint 1 billion Polkadot (DOT) tokens. The nominal value was over $1.19 billion, but due to insufficient liquidity, they ultimately cashed out only about $237k. The attack was successful because the smart contract did not properly verify messages, allowing the hackers to steal administrative control and mint coins. The incident highlights the key role of market liquidity in the success of arbitrage.

CryptoCity13h ago

Fake Ledger Live App Steals $9.5M From 50+ Users Across Multiple Blockchains

A fraudulent Ledger Live app on Apple's App Store stole $9.5 million from over 50 users by compromising wallet information. The incident, involving significant losses for major investors, raises concerns about App Store security, prompting discussions of a possible lawsuit against Apple.

GateNews14h ago

Criticized for freezing USDC too slowly! Circle CEO: We will definitely wait for the court’s order before freezing—refusing to freeze privately/by ourselves without authorization

Circle CEO Jeremy Allaire said the company will not proactively freeze wallet addresses unless it receives a court order or a request from law enforcement. Even amid hacker money-laundering disputes and community backlash, Circle still insists on operating in accordance with the rule of law. Jeremy Allaire sets Circle’s law-enforcement bottom line ----------------------------- As the global cryptocurrency market roils, Circle’s CEO Jeremy Allaire, the stablecoin issuer, delivered a clear stance on the most sensitive issue in the market at a press conference in Seoul, South Korea. He pointed out that although Circle has the technical means to freeze specific wallet addresses, unless it receives a court order or a formal instruction from law-enforcement authorities, the company will not take such action on its own.

CryptoCity16h ago

Attacker Exploiting Bridged Polkadot Vulnerability Transfers $269K to Tornado Cash

On April 15, Arkham reported that the attacker who exploited a Bridged Polkadot vulnerability transferred around $269,000 in stolen funds to Tornado Cash, complicating asset tracking.

GateNews17h ago

Bitcoin Developers Propose BIP 361 to Protect Against Quantum Computing Threats

Bitcoin developers have proposed BIP 361 to safeguard the network against quantum computer risks by freezing vulnerable addresses. The proposal includes a phased plan to transition users to quantum-safe wallets, but it has sparked debate on user control and security.

GateNews17h ago
Comment
0/400
No comments