Rare iPhone Spyware Can Infect Devices With a Single Website Visit, Researchers Say

Researchers say DarkSword can hack an iPhone through Safari after a single visit to a compromised website.

Advertisement
Written by Akash Dutta, Edited by Ketan Pratap | Updated: 19 March 2026 13:42 IST
Highlights
  • Google says DarkSword used multiple iOS flaws in one exploit chain
  • The spyware was designed to steal messages, passwords, and photos
  • Apple is said to have patched the bugs across several iOS releases

DarkSword used Safari, GPU, and kernel exploits to move from a website visit to full iPhone compromise

Photo Credit: Unsplash/Norwood Themes

A newly documented iPhone spyware tool is said to compromise a device simply through a visit to a hacked website. As per security researchers, the toolkit, dubbed DarkSword, was used in campaigns targeting people in Ukraine and relies on a chain of exploits that lets attackers break into Safari, escape its security layers, gain deeper access to iOS, steal data, and then remove themselves within minutes. The spyware is said to only target iPhones running specific versions of iOS 18. Apple is said to have patched the vulnerabilities.

New Dangerous iPhone Spyware Discovered

Google Threat Intelligence Group (GTIG), in partnership with Lookout and iVerify, identified a new iOS full-chain exploit which leveraged multiple zero-day (undiscovered) vulnerabilities to completely compromise devices. Notably, a full-chain exploit means the toolkit links together several bugs to move from a web page to full control of the phone.

Advertisement

In this case, the attack starts in JavaScriptCore, the engine used by Safari and WebKit to run website code. From there, the attackers break out of Safari's sandbox, a security boundary meant to isolate risky web content. It first infects the GPU process and then moves into a more privileged iOS system service called mediaplaybackd. Finally, the chain uses kernel flaws to raise privileges even further and deploy the spyware payload.

Google said the chain used multiple vulnerabilities across Apple's software stack, including memory corruption bugs in JavaScriptCore, a flaw in ANGLE used by Safari's graphics handling, and kernel issues in XNU, the core of iOS. Some of those flaws were exploited as zero-days, meaning attackers used them before fixes were publicly available. The researchers say the relevant fixes were shipped by Apple across iOS 18.6, 18.7.2, 18.7.3, 26.1, 26.2, and 26.3, depending on the bug.

Advertisement

The attack is described as a watering hole campaign. That means attackers compromised websites that their targets were likely to visit, then used those sites to deliver the exploit. Google claimed a suspected Russian espionage group, UNC6353, used DarkSword in watering hole attacks on Ukrainian websites, while TechCrunch reported that the malware was designed to infect anyone who visited certain Ukrainian sites from within the country.

As per the publication, DarkSword was built to steal passwords, photos, browser history, and messages from apps, including WhatsApp and Telegram, along with SMS texts. Researchers also found code aimed at cryptocurrency wallet apps; however, it cannot be said for sure that the main objective behind spreading the spyware was financial gain.

Advertisement

Unlike spyware built for long-term surveillance, DarkSword appears to be designed for a quick smash-and-grab operation. Researchers said its dwell time on a device was likely measured in minutes, just long enough to collect and send data out before disappearing. GTIG also shared code snippets showing efforts to delete crash logs, which would make the intrusion harder to spot.

While it is not easy to block the spyware's attempt to break into a device after it has already been infected, users can minimise the chances of infection by avoiding unfamiliar or high-risk websites, especially in conflict-related or politically sensitive contexts. As per GTIG, the hacker group behind the spyware has also deployed the exploit chain in Saudi Arabia, Turkey, and Malaysia. The total number of infected devices is difficult to gauge.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. OnePlus Pad 4 vs Samsung Galaxy Tab S10 FE+ vs iPad Air: Features Compared
  2. The System Exposed OTT Release Date: When and Where to Watch it Online?
  1. The System Exposed OTT Release Date: When and Where to Watch it Online?
  2. Under the Stars Now Streaming Online: Where to Watch This Beautiful Love Story from Italy
  3. Everybody Loves Sohrab Handa Now Streaming on Zee5: Know Everything About This Whodunnit Mystery Film Online
  4. James Webb Space Telescope Little Red Dots May Reveal Birth of Black Holes
  5. Falcon Heavy Roars Back to Life with Powerful Broadband Satellite Launch
  6. Jolly O Gymkhana Now Available Online: Where to Watch This Tamil Reality Show
  7. Mustafa Mustafa OTT Release: Where to Watch the Tamil Friendship Comedy Online
  8. Batchmates (2026) Now Streaming Online: What You Need to Know
  9. Amazon Now Expands to More Indian Cities With New Micro Warehouses
  10. Amazon Prime Day 2026 India Sale Set for July: Here’s What to Expect
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.