Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    Feds take notice of iOS vulnerabilities exploited under mysterious circumstances

    March 7, 2026

    somehow more offensive than it sounds

    March 7, 2026

    Punk Fury Reborn with Bravado and Bite

    March 7, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»Feds take notice of iOS vulnerabilities exploited under mysterious circumstances
    Feds take notice of iOS vulnerabilities exploited under mysterious circumstances
    Tech Reviews

    Feds take notice of iOS vulnerabilities exploited under mysterious circumstances

    gvfx00@gmail.comBy gvfx00@gmail.comMarch 7, 2026No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Coruna is also notable for its use by three distinct hacking groups. Google first detected its use in February of last year in an operation conducted by a “customer of a surveillance vendor.” The vulnerability exploited, tracked as CVE-2025-23222, had been patched 13 months earlier. In July 2025, a “suspected Russian espionage group” exploited CVE-2023-43000 in attacks planted on websites that were frequented by Ukrainian targets. Last December, when it was used by a “financially motivated threat actor from China,” Google was able to retrieve the complete exploit kit.

    “How this proliferation occurred is unclear, but suggests an active market for ‘second hand’ zero-day exploits,” Google wrote. “Beyond these identified exploits, multiple threat actors have now acquired advanced exploitation techniques that can be re-used and modified with newly identified vulnerabilities.”

    Google researchers went on to write:

    We retrieved all the obfuscated exploits, including ending payloads. Upon further analysis, we noticed an instance where the actor deployed the debug version of the exploit kit, leaving in the clear all of the exploits, including their internal code names. That’s when we learned that the exploit kit was likely named Coruna internally. In total, we collected a few hundred samples covering a total of five full iOS exploit chains. The exploit kit is able to target various iPhone models running iOS version 13.0 (released in September 2019) up to version 17.2.1 (released in December 2023).

    The 23 exploits, along with the code names and other information, are:

    Type Codename Targeted versions (inclusive) Fixed versions CVE
    WebContent R/W buffout 13 → 15.1.1 15.2 CVE-2021-30952
    WebContent R/W jacurutu 15.2 → 15.5 15.6 CVE-2022-48503
    WebContent R/W bluebird 15.6 → 16.1.2 16.2 No CVE
    WebContent R/W terrorbird 16.2 → 16.5.1 16.6 CVE-2023-43000
    WebContent R/W cassowary 16.6 → 17.2.1 16.7.5, 17.3 CVE-2024-23222
    WebContent PAC bypass breezy 13 → 14.x ? No CVE
    WebContent PAC bypass breezy15 15 → 16.2 ? No CVE
    WebContent PAC bypass seedbell 16.3 → 16.5.1 ? No CVE
    WebContent PAC bypass seedbell_16_6 16.6 → 16.7.12 ? No CVE
    WebContent PAC bypass seedbell_17 17 → 17.2.1 ? No CVE
    WebContent sandbox escape IronLoader 16.0 → 16.3.116.4.0 (<= A12) 15.7.8, 16.5 CVE-2023-32409
    WebContent sandbox escape NeuronLoader 16.4.0 → 16.6.1 (A13-A16) 17.0 No CVE
    PE Neutron 13.X 14.2 CVE-2020-27932
    PE (infoleak) Dynamo 13.X 14.2 CVE-2020-27950
    PE Pendulum 14 → 14.4.x 14.7 No CVE
    PE Photon 14.5 → 15.7.6 15.7.7, 16.5.1 CVE-2023-32434
    PE Parallax 16.4 → 16.7 17.0 CVE-2023-41974
    PE Gruber 15.2 → 17.2.1 16.7.6, 17.3 No CVE
    PPL Bypass Quark 13.X 14.5 No CVE
    PPL Bypass Gallium 14.x 15.7.8, 16.6 CVE-2023-38606
    PPL Bypass Carbone 15.0 → 16.7.6 17.0 No CVE
    PPL Bypass Sparrow 17.0 → 17.3 16.7.6, 17.4 CVE-2024-23225
    PPL Bypass Rocket 17.1 → 17.4 16.7.8, 17.5 CVE-2024-23296

    CISA is adding only three of the CVEs to its catalog. They are:

    • CVE-2021-30952 Apple Multiple Products Integer Overflow or Wraparound Vulnerability
    • CVE-2023-41974 Apple iOS and iPadOS Use-After-Free Vulnerability
    • CVE-2023-43000 Apple Multiple products Use-After-Free Vulnerability

    CISA is directing agencies to “apply mitigations per vendor instructions, follow applicable… guidance for cloud services, or discontinue use of the product if mitigations are unavailable.” The agency went on to warn: “These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.”

    Table of Contents

    Toggle
      • Related posts:
    • Today's NYT Wordle Hints, Answer and Help for Nov. 1 #1596- CNET
    • Ubiquiti U7 Mesh Review: An Unique Wi-Fi 7 Solution with Extreme Backhaul Range
    • Ars Live recap: Is the AI bubble about to pop? Ed Zitron weighs in.

    Related posts:

    Watch this – the latest humanoid robots are both unnervingly sassy and comfortingly error-prone

    Best NAS Servers: 2026's Current Top Five Network-Attached Storage Machines

    Today's NYT Connections: Sports Edition Hints, Answers for Nov. 21 #424

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Articlesomehow more offensive than it sounds
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    Valve doesn’t sound confident the Steam Machine will ship in 2026

    March 7, 2026
    Tech Reviews

    Today’s NYT Mini Crossword Answers for March 7

    March 7, 2026
    Tech Reviews

    ‘Two days on a single charge’: why two months with the OnePlus 15R has got me excited about the 15T’s ‘Glacier’ battery

    March 7, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    BMW Will Put eFuel In Cars Made In Germany From 2028

    October 14, 202511 Views

    Best Sonic Lego Deals – Dr. Eggman’s Drillster Gets Big Price Cut

    December 16, 20259 Views

    What is Fine-Tuning? Your Ultimate Guide to Tailoring AI Models in 2025

    October 14, 20259 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    BMW Will Put eFuel In Cars Made In Germany From 2028

    October 14, 202511 Views

    Best Sonic Lego Deals – Dr. Eggman’s Drillster Gets Big Price Cut

    December 16, 20259 Views

    What is Fine-Tuning? Your Ultimate Guide to Tailoring AI Models in 2025

    October 14, 20259 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.