Your iPhone Could Be Hemorrhaging Crypto – CISA Says Patch Now

Federal agencies must patch iPhone vulnerabilities by March 26 as Coruna exploit kit targets crypto wallets on iOS 13-17.2.1

Alex Barrientos Avatar
Alex Barrientos Avatar

By

Image: TabTrader.com – Flickr

Key Takeaways

Key Takeaways

  • Coruna exploit kit targets iPhone iOS 13.0-17.2.1 through fake gambling sites draining crypto wallets
  • CISA mandates federal agencies patch vulnerabilities by March 26 amid nation-state tool proliferation
  • Latest iOS updates and Lockdown Mode completely neutralize Coruna’s 23-exploit attack chains

Fake gambling sites are draining crypto wallets through weaponized iPhone vulnerabilities, and federal agencies just got marching orders to fix the mess by March 26. The Coruna exploit kit turns your browser into a backdoor, targeting iOS versions 13.0 through 17.2.1 with surgical precision. CISA’s emergency directive isn’t just bureaucratic theater—it’s acknowledgment that nation-state spyware has gone mainstream criminal.

Your salvation exists, but only if you act fast. The latest iOS updates render these attacks useless, and Lockdown Mode blocks them entirely.

Twenty-Three Exploits, One Devastating Kit

Coruna chains together five attack sequences that obliterate iOS security layers systematically.

This isn’t your garden-variety malware. Google’s Threat Intelligence Group discovered Coruna deploying 23 exploits across five sophisticated chains, each designed to crack specific iOS defenses. The kit achieves WebKit remote code execution, bypasses Pointer Authentication Code protections, and escapes sandbox restrictions.

It defeats Portable Privileged Layer safeguards and escalates to kernel-level access. The framework uses unique cookie-based resource hashing and deploys unencrypted payloads through hidden iFrames on scam sites. Some attacks have no geolocation limits, casting a wider net than typical targeted campaigns.

Criminal Gold Rush

Russian spies and Chinese financial hackers are running the same playbook against your wallet.

The threat actors read like a cyber United Nations of bad intentions. UNC6353, suspected Russian state operators, and UNC6691, Chinese financial cybercriminals, both weaponize Coruna for distinctly different goals—espionage versus cryptocurrency theft.

According to iVerify researchers, these represent “sophisticated spyware-grade capabilities that migrated from commercial surveillance vendors into the hands of nation-state actors and, ultimately, mass-scale criminal operations.” The democratization of nation-state tools means your personal iPhone faces enterprise-level threats targeting fake gambling and crypto platforms.

Your Defense Strategy Against Drive-By Theft

Three security layers can stop Coruna cold, but only if you activate them properly.

Racing to update iOS isn’t paranoia—it’s financial preservation. The exploit kit deploys through hidden iFrames embedded in scam sites, requiring zero user interaction beyond visiting compromised pages. Your iPhone’s built-in defenses work against these specific vulnerabilities.

  • Current iOS versions neutralize Coruna’s attack chains completely
  • Lockdown Mode provides additional protection by blocking the exploit framework
  • Private browsing also disrupts the kit’s cookie-based targeting system

Crypto investors especially should treat these protections like hardware wallet backups—essential insurance against catastrophic loss.

Federal agencies scrambling to patch by month’s end signals how seriously government security experts view this threat. The exploit commoditization trend means today’s nation-state tools become tomorrow’s criminal weapons. Update your iPhone, enable Lockdown Mode for sensitive browsing, and remember—your crypto wallet is only as secure as your weakest device.

Share this

At Gadget Review, our guides, reviews, and news are driven by thorough human expertise and use our Trust Rating system and the True Score. AI assists in refining our editorial process, ensuring that every article is engaging, clear and succinct. See how we write our content here →