{"id":12604,"date":"2026-03-11T07:42:37","date_gmt":"2026-03-11T07:42:37","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=12604"},"modified":"2026-03-11T07:42:37","modified_gmt":"2026-03-11T07:42:37","slug":"feds-take-discover-of-ios-vulnerabilities-exploited-underneath-mysterious-circumstances","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=12604","title":{"rendered":"Feds take discover of iOS vulnerabilities exploited underneath mysterious circumstances"},"content":{"rendered":"<p> <br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2026\/03\/iphone-14-1152x648.jpg\" \/><\/p>\n<p>The Cybersecurity and Infrastructure Safety Company has ordered federal businesses to patch three crucial iOS vulnerabilities that have been exploited over a 10-month span in hacking campaigns carried out by three distinct teams.<\/p>\n<p>The hacking campaigns got here to mild on Thursday in a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/coruna-powerful-ios-exploit-kit\">report<\/a> revealed by Google. All three campaigns used Coruna, the title of a complicated hacking package that amassed 23 separate iOS exploits into 5 potent exploit chains. Whereas a number of the vulnerabilities had been exploited as zero-days in earlier, unrelated campaigns, all had been patched by the point Google noticed them being exploited by Coruna. When used towards older iOS variations, the package nonetheless posed a formidable menace given the excessive caliber of the exploit code and the wide selection of capabilities.<\/p>\n<h2>The case of the promiscuous 2nd-hand zero-days<\/h2>\n<p>\u201cThe core technical worth of this exploit package lies in its complete assortment of iOS exploits,\u201d Google researchers wrote. \u201cThe exploits characteristic in depth documentation, together with docstrings and feedback authored in native English. Probably the most superior ones are utilizing private exploitation strategies and mitigation bypasses.\u201d<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/arstechnica.com\/security\/2026\/03\/cisa-adds-3-ios-flaws-to-its-catalog-of-known-exploited-vulnerabilities\/\">Learn full article<\/a><\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/arstechnica.com\/security\/2026\/03\/cisa-adds-3-ios-flaws-to-its-catalog-of-known-exploited-vulnerabilities\/#comments\">Feedback<\/a><\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>The Cybersecurity and Infrastructure Safety Company has ordered federal businesses to patch three crucial iOS vulnerabilities that have been exploited over a 10-month span in hacking campaigns carried out by three distinct teams. The hacking campaigns got here to mild on Thursday in a report revealed by Google. All three campaigns used Coruna, the title [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":12606,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[8179,1994,4670,1093,8178,7448,2721],"class_list":["post-12604","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-news","tag-circumstances","tag-exploited","tag-feds","tag-ios","tag-mysterious","tag-notice","tag-vulnerabilities"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12604"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12604\/revisions"}],"predecessor-version":[{"id":12605,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12604\/revisions\/12605"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/12606"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12604"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12604"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-04-26 17:43:32 UTC -->