A recently discovered iOS exploit kit, known as DarkSword, has been linked to state-sponsored hackers and spyware vendors, who leverage it to compromise devices for surveillance purposes. The kit exploits six iOS vulnerabilities, ultimately leading to full device compromise. This sophisticated exploit chain is designed to bypass security measures and gain unrestricted access to the targeted device. The use of DarkSword by state-sponsored actors elevates the threat landscape from traditional cybercrime to geopolitical tensions, with far-reaching implications1. The fact that spyware vendors are also utilizing this exploit kit suggests a thriving market for such tools, further increasing the risk of widespread adoption. As a result, the potential consequences of a successful DarkSword exploit extend beyond the immediate target, making it a significant concern for individuals and organizations alike. The involvement of state-sponsored hackers and spyware vendors in the use of DarkSword raises the stakes, making it essential for practitioners to stay vigilant and take proactive measures to protect against such threats.