New DarkSword tool targets hundreds of millions of iPhones

A hacking technique called DarkSword, used by Russian hackers, can compromise iPhones running iOS 18 simply by visiting infected websites. Discovered in the wild, this tool has been deployed in espionage and cybercriminal campaigns to target thousands of devices indiscriminately. It is now available online in a reusable form, risking a large portion of iPhone users worldwide.

iPhone hacking techniques were once rare, likened to elusive animals used stealthily against select targets. Recent developments show a shift, with espionage and cybercriminal groups embedding phone-takeover tools in websites to hack thousands of devices broadly. Among these is DarkSword, a powerful method spotted in active use by Russian hackers. This technique can seize control of devices on iOS 18 with just a visit to a malicious site, affecting hundreds of millions of iPhones. The tool has surfaced on the web in an easily adaptable format, heightening risks for many users. Previously selective hacks are now scaling up, as noted in cybersecurity observations.

Related Articles

IT expert Supangat warns of Lebaran digital scams via WhatsApp and SMS in a press conference illustration.
Image generated by AI

IT expert warns of digital scams ahead of Lebaran

Reported by AI Image generated by AI

Ahead of Idul Fitri, IT expert from Untag Surabaya, Supangat, urges the public to heighten vigilance against scams via WhatsApp and SMS. Rising digital transactions are exploited by cybercriminals. Vida founder Niki Santo Luhur identifies two main methods: phishing and malware prevalent in Indonesia.

Following earlier reports of direct attacks on OpenClaw AI agents, TechRadar warns that infostealers are now disguising themselves as Claude Code, OpenClaw, and other AI developer tools. Users should exercise caution with search engine results. Published March 18, 2026.

Reported by AI

Apple has addressed two zero-day vulnerabilities in its WebKit engine that were exploited in sophisticated attacks. The company released patches to fix these bugs, enhancing security for users of its devices.

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

Reported by AI

Journalists reported mysterious phishing attempts by unknowns a few weeks ago. The Dutch secret service now holds Russia responsible for attacks on the messaging apps WhatsApp and Signal. The report explains how the attacks work and how users can protect themselves.

Attackers have exploited the .arpa internet domain to host malicious websites and deliver phishing links. They use IPv6 and hidden .arpa addresses to disguise URLs and steal user credentials. The scheme was reported by TechRadar on March 2, 2026.

Reported by AI

Several top photo ID apps have exposed user data due to database misconfigurations, impacting an estimated 150,000 individuals. The breach highlights vulnerabilities in mobile security tools designed for identity verification. TechRadar reported the incident on February 9, 2026.

 

 

 

This website uses cookies

We use cookies for analytics to improve our site. Read our privacy policy for more information.
Decline