Nation-state actors and spyware vendors are utilizing a newly discovered exploit kit, known as Darksword, to compromise iPhones and extract sensitive information. This marks the second iOS exploit chain uncovered in a month, highlighting the increasing sophistication of threats targeting Apple devices. The Darksword exploit kit is capable of stealing a wide range of data, including passwords, emails, and messages. Google has warned that multiple spyware vendors are leveraging this kit, which is also being used by suspected state-sponsored attackers1. The involvement of nation-state actors shifts the threat landscape from traditional cybercrime to geopolitically motivated attacks, requiring a distinct approach to mitigation. This development has significant implications for individuals and organizations relying on iPhones, as the threat model has expanded to include state-aligned activity, so what matters most to practitioners is recognizing that a new, more complex playbook is now required to counter these emerging threats.
State snoops and spyware vendors planting info-stealing malware on iPhones, Google warns
⚠️ Critical Alert
Why This Matters
State-aligned activity involving Google shifts the threat model from criminal to geopolitical — different playbook required.
References
- The Register. (2026, March 18). State snoops and spyware vendors planting info-stealing malware on iPhones, Google warns. The Register. https://go.theregister.com/feed/www.theregister.com/2026/03/18/darksword_exploit_kit_steals_iphone/
Original Source
The Register
Read original →