CISA Orders Patch for iOS Flaws Exploited in Crypto Theft & Espionage Attacks

by Chief Editor

CISA Issues Urgent Warning: Coruna Exploit Kit Targets iOS Devices

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive to federal agencies, demanding they patch three critical security flaws in iOS devices. These vulnerabilities are actively being exploited by the sophisticated Coruna exploit kit, raising concerns about cyberespionage and cryptocurrency theft.

What is the Coruna Exploit Kit?

Coruna is described as a “nation-state-grade” toolkit capable of targeting 23 iOS vulnerabilities across versions 13.0 through 17.2.1. Google Threat Intelligence Group (GTIG) researchers recently revealed the kit’s capabilities, noting its use of multiple exploit chains, some of which were previously unknown “zero-day” attacks. The kit allows attackers to bypass key security features, including Pointer Authentication Code (PAC), sandbox restrictions, and the Page Protection Layer (PPL).

This allows threat actors to gain remote code execution within WebKit and escalate privileges to kernel level – essentially granting them complete control over a vulnerable device.

Who is Using Coruna?

The threat isn’t limited to a single actor. GTIG has observed Coruna being deployed by a diverse range of groups, including surveillance vendors, a suspected Russian state-backed hacking group (UNC6353), and a financially motivated Chinese threat actor (UNC6691). The Chinese group has been particularly active, using the kit to compromise fake gambling and cryptocurrency websites, stealing digital wallets from unsuspecting users.

iVerify, a mobile security firm, highlights that Coruna represents a concerning trend: the migration of advanced spyware capabilities from commercial vendors to nation-state actors and, large-scale criminal operations.

What’s Being Done to Mitigate the Risk?

CISA has added CVE-2021-30952, CVE-2023-41974, and CVE-2023-43000 to its Known Exploited Vulnerabilities (KEV) catalog. This mandates that all Federal Civilian Executive Branch (FCEB) agencies patch their devices by March 26, 2026, as per Binding Operational Directive (BOD) 22-01.

But, the agency strongly urges all organizations, including those in the private sector, to prioritize patching these vulnerabilities to protect their systems.

Fortunately, there are some built-in defenses. The exploits are ineffective on the latest versions of iOS and are blocked when Apple’s Lockdown Mode is enabled or when users are browsing in private mode.

Future Trends: The Proliferation of Exploit Kits

The Coruna case highlights a worrying trend: the increasing accessibility of sophisticated exploit kits. Previously, such tools were largely confined to nation-state actors. Now, they are becoming available to a wider range of threat actors, including financially motivated criminals.

This proliferation is likely to continue, driven by several factors:

  • The Commercialization of Hacking: The market for exploits and hacking tools is growing, with vendors offering kits for sale to a variety of customers.
  • The Rise of Exploit-as-a-Service: Some actors are offering exploit capabilities as a subscription service, lowering the barrier to entry for less technically skilled attackers.
  • The Increasing Value of Mobile Devices: Smartphones and tablets are becoming increasingly valuable targets, as they contain a wealth of personal and financial information.

We can expect to see more exploit kits emerge, targeting a wider range of platforms and vulnerabilities. Organizations will require to invest in robust security measures, including regular patching, endpoint detection and response (EDR) solutions, and employee training, to protect themselves from these evolving threats.

FAQ

What versions of iOS are affected? iOS versions 13.0 through 17.2.1 are vulnerable.

What is Lockdown Mode? Lockdown Mode is an optional security feature in iOS that provides extreme protection against highly targeted cyberattacks.

Is private browsing enough protection? Private browsing blocks the exploits within the Coruna kit, but it doesn’t protect against other threats.

What should I do if I suspect my device has been compromised? Immediately update your iOS version, run a full system scan with a reputable mobile security app, and change your passwords.

Where can I find more information about CISA’s KEV catalog? Visit the CISA website: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Pro Tip: Enable automatic updates on your iOS devices to ensure you receive the latest security patches as soon as they are released.

Stay informed about the latest cybersecurity threats and take proactive steps to protect your devices and data.

You may also like

Leave a Comment