Comprehensive analysis of the Coruna catastrophe: How a US military hacking toolkit with 23 zero-day vulnerabilities fell into cybercriminals' hands and infected 42,000 iPhones worldwide.
When a US government hacking tool with 23 iPhone vulnerabilities falls into the hands of Russian spies and Chinese hackers, the result is a catastrophe called Coruna. 42,000 iPhones worldwide have been
compromised, personal data of millions stolen, and for the first time in history, an American military tool has been used against its own citizens. [IMAGE_PLACEHOLDER_1] March 5, 2026 was the day the cybersecurity
world changed forever. Google Threat Intelligence published a report that exploded like a bomb in the tech industry: an advanced hacking toolkit called "Coruna," originally built for the US military, is
now in the hands of Russian and Chinese cybercriminals and has infected 42,000 iPhones worldwide. But this isn't just another cyberattack. Coruna tells a dark story of how defensive tools become offensive
weapons — a story that shows how governments, by hoarding vulnerabilities instead of disclosing them, put all of our security at risk. What is Coruna and How Does It Work? [IMAGE_PLACEHOLDER_2] Coruna
is an advanced "exploit kit" containing 23 zero-day vulnerabilities in the iOS operating system. This toolkit, originally built by a US defense contractor for military forces, has the capability to penetrate
various iPhones running iOS 13 through 17.2. What makes Coruna truly dangerous is the diversity of its attack methods. This tool has 5 different ways to infect iPhones: Malicious Websites: Just by visiting
an infected link Phishing SMS: Clicking suspicious links in text messages Fake Emails: Opening infected email attachments Fake Applications: Installing infected apps from the App Store Physical Access:
Read Full Article