The New Grok Times

The news. The narrative. The timeline.

Technology

Russian Zero-Click iPhone Exploit Hit Every Unpatched Device That Visited Ukrainian Government Websites

A smartphone screen displaying code with a dark hooded figure silhouette in the background
New Grok Times
TL;DR

Russian-linked hackers deployed DarkSword — a zero-click iPhone exploit — on Ukrainian websites. If you visited certain sites on an unpatched iPhone, it was probably compromised. The malware steals crypto, messages, everything.

MSM Perspective

The Record confirmed March 18 this is the work of UNC6353, a Russian threat actor. Google GTIG published technical analysis linking DarkSword to nation-state tooling. Apple patched iOS 18.4 after receiving reports.

X Perspective

Cybersecurity accounts are divided between those alarmed by the zero-click vector and those noting Apple's patch timeline was fast by historical standards. @HorstKrieger called it 'professionally designed.' The core concern: this exploit sits on compromised Ukrainian sites waiting for any iPhone to connect. Not spy vs. spy — anyone with an unpatched iPhone in Ukraine was a target.

A Russian threat actor — confirmed by Google GTIG as UNC6353 — deployed DarkSword, a zero-click iPhone exploit, on Ukrainian government websites. No phishing link. No app to download. Visiting a compromised page was enough. Your iPhone was owned.

The exploit chain uses six vulnerabilities, including three zero-days Apple did not know about until Google reported them. Devices that had not yet installed Apple's security fix remained exposed. Once infected, the GHOSTBLADE payload grabs emails, messages, photos, credentials, and cryptocurrency wallets — MetaMask, Coinbase, Binance, and Ledger.

"This malware is highly sophisticated and appears to be a professionally designed platform," Lookout researchers noted. This was not a ransomware gang running scripts. This was a state operation.

Researchers say the attackers "may not be highly sophisticated themselves." Limited efforts to conceal parts of the operation suggest they purchased exploits off the shelf and used AI to fill gaps. A secondary market for advanced exploits now exists — nation-state-level iPhone hacking, available to anyone with cryptocurrency and a dark web connection.

The campaign hit a Ukrainian regional news outlet covering the war and a Ukrainian court's website. Classic watering hole attack: compromise the site your targets visit, wait for them to come to you.

Google collaborated with CERT-UA to take down the malicious code. Apple released a fix after receiving reports from Google and Lookout.

If you are in Ukraine running an iPhone, update immediately. Think twice before visiting any government-adjacent websites for a while.

— KATYA VOLKOV, Moscow


Sources & X Posts

News Sources
[1] https://therecord.media/russia-linked-hackers-use-iphone-exploit-ukraine
[2] https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain
X Posts
[3] A likely Russia-linked threat actor deployed a sophisticated iPhone hacking tool to target Ukrainian users and steal sensitive data https://x.com/HorstKrieger/status/2034879703496962338
[4] A powerful iPhone hacking tool called DarkSword was found sitting openly on compromised Ukrainian websites — silently breaking into any unpatched iPhone https://x.com/cybernewslive/status/2034911003981349001