Coruna Exploit Kit Compromises 42K iPhones via Zero-Click
Topics Agentic AI · AI Regulation · AI Capital
A leaked U.S. government exploit kit called 'Coruna' has enabled the first confirmed mass-scale iOS attack — 42,000+ devices compromised via a 23-vulnerability zero-click chain spanning iOS 13 through 17.2.1. Google TAG and iVerify confirm Chinese cybercriminals, Russian state actors, and commercial spyware vendors are all actively weaponizing it. If your mobile fleet includes any iPhone below iOS 17.3, those devices are known-compromisable today. Push emergency MDM updates and deploy mobile threat detection for Coruna IOCs before the end of business.
◆ INTELLIGENCE MAP
01 Coruna iOS Exploit Kit: First Mass-Scale Mobile Compromise from Leaked USG Tools
act nowThree independent intelligence streams confirm a 23-vulnerability zero-click iOS exploit chain of likely U.S. government origin has proliferated to Russian, Chinese, and commercial threat actors, with 42,000+ confirmed compromises via watering-hole attacks — the most significant mobile threat since Pegasus.
02 Four Concurrent Active Threats: VMware KEV, APT41 Google Drive C2, Packagist RAT, Havoc Ransomware Precursor
act nowCVE-2026-22719 in VMware Aria Operations is confirmed actively exploited and on CISA's KEV as of March 3; simultaneously, APT41-linked Silver Dragon is hiding C2 in Google Drive, malicious Packagist packages deploy cross-platform RATs through Laravel supply chains, and Havoc C2 is being delivered via fake tech support as a ransomware precursor.
03 Identity Attack Industrialization: 89% of Breaches, 230B Threats/Day, and Attack Factories
monitorPalo Alto IR data confirms identity weaknesses in 89% of breach investigations, Cloudflare's inaugural threat intel report quantifies industrialized attacks at 230B+ daily, and Microsoft flagged active OAuth redirection abuse bypassing phishing defenses — identity-based attacks now achieve malware-equivalent outcomes without requiring advanced skills.
04 JVG Quantum Algorithm Compresses Post-Quantum Migration Timeline from Decade to Years
monitorThe Jesse-Victor-Gharabaghi algorithm reportedly reduces the qubit threshold for breaking RSA and ECC from ~1 million to under 5,000 — a 1,000x reduction that places Q-Day within current hardware roadmaps (2-4 years) rather than the previously assumed decade-plus timeline.
05 CISA Institutional Degradation and Federal Cyber Capacity Erosion
backgroundCISA CIO Robert Costello (18-year DHS veteran) departed March 3 after apparent forced transfer, joining a pattern of senior exits including the acting director replacement and CHRO transfer — institutional knowledge loss at the nation's primary civilian cybersecurity agency during the highest-threat period in years demands diversification of government threat intel dependencies.
◆ DEEP DIVES
01 Coruna: A Leaked Government Exploit Kit Is the EternalBlue of Mobile
<h3>The First Mass-Scale iOS Attack</h3><p>Three independent intelligence streams confirmed today what mobile security researchers have feared since Operation Triangulation in 2023: a <strong>U.S. government-origin iOS exploit kit</strong> has leaked and proliferated into the hands of multiple adversary groups. The kit — called <strong>Coruna</strong> — chains <strong>23 separate vulnerabilities</strong> to achieve zero-click compromise of iPhones running iOS 13 through 17.2.1. At least <strong>42,000 devices</strong> are confirmed compromised, with the true number almost certainly higher.</p><p>Google's Threat Intelligence Group first identified Coruna in February 2025. iVerify corroborated the analysis and suggested U.S. government origins. The attack vector is a classic <strong>watering hole</strong> — the target visits a malicious or compromised website, and the phone is owned. No taps, no installs, no user interaction.</p><hr><h4>Why This Is EternalBlue-Scale</h4><p>The parallel to EternalBlue is deliberate and precise. In 2017, NSA exploit tools leaked by the Shadow Brokers fueled WannaCry (200,000+ systems) and NotPetya. Coruna follows the same pattern: government offensive tools leaking into a <strong>'second-hand zero-day market'</strong> where they cascade to less discriminating operators.</p><table><thead><tr><th>Dimension</th><th>EternalBlue (2017)</th><th>Coruna (2026)</th></tr></thead><tbody><tr><td><strong>Origin</strong></td><td>NSA (Shadow Brokers leak)</td><td>U.S. government framework (suspected leak)</td></tr><tr><td><strong>Target</strong></td><td>Windows SMB</td><td>Apple iOS (13–17.2.1)</td></tr><tr><td><strong>Exploit Chain</strong></td><td>Single vulnerability</td><td>23 chained vulnerabilities</td></tr><tr><td><strong>Confirmed Scale</strong></td><td>200,000+ (WannaCry alone)</td><td>42,000+ confirmed, likely far higher</td></tr><tr><td><strong>Current Operators</strong></td><td>North Korea, Russia, criminals</td><td>Chinese cybercriminals, Russian state actors, spyware vendors</td></tr></tbody></table><p>The <strong>23-vulnerability chain</strong> is extraordinary. Commercial spyware like Pegasus typically chains 3-5 exploits. This depth suggests years of development investment and deep iOS internals expertise — likely spanning WebKit renderer bugs, sandbox escapes, kernel exploits, and persistence mechanisms. The breadth across <strong>five major iOS versions</strong> indicates the toolkit was actively maintained before proliferation.</p><blockquote>Any employee browsing a compromised website on a vulnerable iPhone is silently owned — this includes news sites, industry forums, and supply chain vendor portals that threat actors commonly target as watering holes.</blockquote><h4>What We Don't Know Yet</h4><p><em>No CVEs have been publicly assigned.</em> This suggests either coordinated disclosure is in progress or Apple hasn't fully characterized the exploit chain. Watch Apple's next security advisory closely. Specific IOCs from Google TAG and iVerify should be expected within days.</p>
Action items
- Query MDM immediately for any iPhone running iOS below 17.3 — push forced updates or quarantine non-compliant devices from corporate resources within 24 hours
- Enable Apple Lockdown Mode on devices belonging to executives, IT administrators, finance personnel, and anyone with production access by end of week
- Deploy iVerify or equivalent mobile threat detection across managed and BYOD iOS devices within 7 days to scan for Coruna indicators as IOCs are released
- Verify web content filtering blocks uncategorized and newly registered domains across all network egress points this week
Sources:Leaked U.S. exploit kit 'Coruna' just hit 42K+ iOS devices — is your mobile fleet exposed? · Coruna exploit kit: 23-vuln iOS chain from USG leaked to Russian & Chinese threat actors — patch now · Coruna iPhone exploit kit — possibly US gov-built — is hijacking devices via drive-by web attacks
02 Four Active Threats to Triage Today: VMware KEV, APT41 in Google Drive, Laravel Supply Chain, and Havoc Ransomware Precursor
<h3>CVE-2026-22719: VMware Aria Operations — Confirmed Exploited</h3><p><strong>CVE-2026-22719</strong> in VMware Aria Operations was added to CISA's Known Exploited Vulnerabilities catalog on <strong>March 3, 2026</strong>. KEV listing means confirmed exploitation — not a proof-of-concept, not theoretical. Aria Operations is a centralized IT management platform with deep hooks into your virtualization infrastructure. Compromise gives attackers a <strong>god-view of your virtual environment</strong>: VM inventory, performance data, configuration details, and potentially credentials for vCenter and integrated systems.</p><p><em>Specific vulnerability class and CVSS score are not yet disclosed in available reporting. Check Broadcom's security advisory for patch details.</em></p><hr><h3>Silver Dragon / APT41: Google Drive as C2</h3><p>APT41-linked <strong>Silver Dragon</strong> has been active since mid-2025 targeting government entities in <strong>Europe and Southeast Asia</strong>, pairing Cobalt Strike with <strong>Google Drive as command-and-control infrastructure</strong>. This TTP evolution is significant because most organizations cannot block or easily monitor Google Drive API traffic. If your detection strategy relies on network IOCs and domain blocklists, you have a critical blind spot.</p><table><thead><tr><th>TTP Component</th><th>Tool/Service</th><th>Detection Difficulty</th><th>Defensive Approach</th></tr></thead><tbody><tr><td>Post-exploitation</td><td>Cobalt Strike</td><td>Medium (mature signatures)</td><td>EDR behavioral detection, memory scanning</td></tr><tr><td>C2 channel</td><td>Google Drive API</td><td>High (blends with legit traffic)</td><td>CASB, cloud API behavioral analytics</td></tr><tr><td>Data exfiltration</td><td>Google Drive</td><td>High (encrypted, trusted domain)</td><td>DLP on cloud storage, anomalous upload monitoring</td></tr></tbody></table><h3>Packagist Supply Chain: Cross-Platform RAT via Fake Laravel Packages</h3><p>Threat actors uploaded malicious packages to <strong>Packagist</strong> (the primary PHP package repository) disguised as legitimate Laravel utilities. Installation via Composer deploys a <strong>cross-platform RAT functional on Windows, macOS, and Linux</strong>. The blast radius extends beyond the developer's machine to CI/CD pipelines, source code repositories, deployment credentials, and production environments.</p><h3>Havoc C2 via Fake Tech Support</h3><p>The <strong>Havoc C2 framework</strong> — an open-source post-exploitation tool with lower detection rates than Cobalt Strike in most EDR products — is being delivered through social engineering campaigns impersonating IT or tech support. Researchers assess this as a <strong>ransomware precursor</strong>. If your detection engineering team hasn't specifically tuned for Havoc, assume you're blind to it.</p><blockquote>You have four active threats to triage today — and your detection stack likely catches only one of them out of the box.</blockquote>
Action items
- Identify all VMware Aria Operations instances and apply Broadcom's patch for CVE-2026-22719 within 24-48 hours; if patching impossible, isolate management interfaces to hardened jump hosts
- Run composer audit across all PHP/Laravel projects this week and cross-reference against known malicious package indicators; implement composer.lock integrity checks in CI/CD
- Deploy behavioral monitoring for anomalous Google Drive API usage — alert on API calls from non-browser processes, periodic file operations consistent with C2 beaconing, and Drive access from servers
- Verify EDR has Havoc C2 detection content and deploy community YARA rules; run a targeted phishing simulation using fake tech support pretext this quarter
Sources:CVE-2026-22719 is on CISA's KEV list — patch your VMware Aria Operations now or assume compromise
03 Identity Attacks Industrialized: 89% of Breaches, 230 Billion Threats/Day, and the OAuth Redirection Problem
<h3>The Numbers Paint a Clear Picture</h3><p>Three independent intelligence streams converged today on a single conclusion: <strong>identity is the attack surface that matters most right now</strong>, and it's being exploited at industrial scale.</p><ul><li><strong>Palo Alto Networks IR data:</strong> Identity weaknesses present in <strong>89% of breach investigations</strong></li><li><strong>Cloudflare threat intel report:</strong> <strong>230 billion+ threats blocked per day</strong> by a single provider, with 'attack factories' achieving malware-equivalent outcomes using tokens and SaaS relationships</li><li><strong>Microsoft advisory:</strong> Attackers actively exploiting <strong>legitimate OAuth redirection behavior</strong> to bypass email and browser phishing defenses</li></ul><p>The Cloudflare report introduces a critical conceptual shift: measuring <strong>attack effectiveness</strong> (ratio of effort to outcome) rather than attacker sophistication. Their proof point: last summer's <strong>Salesloft Drift attack impacted 700+ companies</strong> through trusted SaaS vendor relationships — no advanced skills required.</p><hr><h4>OAuth: They're Using the Protocol as Designed</h4><p>Microsoft's advisory is specific: threat actors aren't <em>breaking</em> OAuth — they're <strong>using it as designed</strong> to slip past defenses that trust the protocol. The attack chain involves phishing users into granting OAuth consent to malicious applications, which then use delegated permissions (mail.read, files.readwrite, directory.read.all) without triggering traditional credential-based alerts. Default Entra ID configurations that allow user consent to unverified publishers are the enabler.</p><p>This maps to <strong>MITRE ATT&CK T1550</strong> (Use Alternate Authentication Material) and <strong>T1528</strong> (Steal Application Access Token). The key insight from cross-source analysis: identity-based attacks have <strong>crossed the industrialization threshold</strong>. What was once the province of skilled operators is now available as packaged operations.</p><blockquote>Cloudflare's threat report argues the industry should stop measuring attacker sophistication and start measuring attack effectiveness — because identity-based attacks now deliver malware-equivalent outcomes at industrial scale without requiring advanced skills.</blockquote><h4>Healthcare: The Canary in the Coal Mine</h4><p>One source flagged that healthcare organizations are <strong>quietly accepting more cyber risk to cut costs</strong> — during a period when attacks are industrialized at 230B/day. If your organization operates in healthcare, partners with healthcare entities, or processes PHI, this directly affects your third-party risk posture. <em>Document every risk acceptance decision with board-level sign-off.</em></p>
Action items
- Restrict Entra ID user consent to admin-approved apps only, require verified publishers, and audit all existing OAuth app grants for overprivileged permissions (mail.read, files.readwrite, directory.read.all) this week
- Deploy or tune Identity Threat Detection and Response (ITDR) capabilities focused on token anomalies, impossible travel for service accounts, and SaaS-to-SaaS lateral movement this month
- Implement continuous detection validation — test whether SIEM rules, alert logic, and detection pipelines actually fire correctly against known identity TTPs on a monthly cadence
- Review Salesloft Drift attack TTPs and audit all SaaS vendor integrations with write access to your environment this quarter
Sources:Identity in 89% of breaches, OAuth abuse rising, and your AI agents may be running without guardrails · Leaked U.S. exploit kit 'Coruna' just hit 42K+ iOS devices — is your mobile fleet exposed? · CVE-2026-22719 is on CISA's KEV list — patch your VMware Aria Operations now or assume compromise
04 JVG Algorithm: Post-Quantum Migration Just Went from 'Decade Out' to 'Urgent'
<h3>A 1,000x Reduction in Quantum Resources Needed</h3><p>The <strong>Jesse-Victor-Gharabaghi (JVG) quantum decryption algorithm</strong> has reportedly reduced the quantum computing resources needed to break RSA and ECC encryption by <strong>a factor of 1,000</strong>. Where Shor's algorithm required an estimated 1 million qubits — safely a decade or more away — JVG claims to achieve the same result with <strong>fewer than 5,000 qubits</strong>.</p><p>Current quantum hardware from IBM, Google, and others operates in the <strong>1,000–1,500 qubit range</strong>, with roadmaps targeting 10,000+ qubits within 2-4 years. <em>If JVG's claims hold under peer review</em>, Q-Day shifts from 'sometime in the 2030s' to potentially the <strong>late 2020s</strong>.</p><table><thead><tr><th>Parameter</th><th>Shor's Algorithm</th><th>JVG Algorithm</th><th>Implication</th></tr></thead><tbody><tr><td>Qubits required</td><td>~1,000,000</td><td><5,000</td><td>Within near-term hardware roadmaps</td></tr><tr><td>Timeline to threat</td><td>~10+ years</td><td>Potentially 2–4 years</td><td>Harvest-now-decrypt-later already viable</td></tr><tr><td>Affected cryptosystems</td><td>RSA, ECC</td><td>RSA, ECC</td><td>TLS, VPN, PKI, SSH, code signing, S/MIME</td></tr><tr><td>NIST PQC alternatives</td><td colspan="2">ML-KEM (Kyber), ML-DSA (Dilithium), SLH-DSA (SPHINCS+)</td><td>Standards finalized; migration is the bottleneck</td></tr></tbody></table><h4>The Harvest-Now-Decrypt-Later Problem Is Already Active</h4><p>Nation-state actors with active quantum programs are already intercepting and storing encrypted traffic. Every day your data traverses RSA/ECC-protected channels is a day that data accumulates in adversary archives. For data with confidentiality requirements beyond 5 years — <strong>healthcare records, financial data, trade secrets, classified communications</strong> — the exposure window is already open.</p><p>This finding arrives alongside Google's recent deployment of quantum-resistant Merkle Tree Certificates in Chrome and the IETF's formation of a new post-quantum working group. The infrastructure for migration is maturing, but organizational readiness lags significantly.</p><blockquote>If JVG holds under peer review, the conversation shifts from 'we should start thinking about PQC' to 'we needed to start two years ago.' A full cryptographic migration takes years — the clock just accelerated.</blockquote><h4>Critical Caveat</h4><p>JVG has not yet undergone extensive peer review. Extraordinary claims require extraordinary evidence, and quantum computing breakthroughs have been prematurely announced before. However, the <strong>asymmetric cost of being wrong</strong> favors action: starting PQC migration early costs operational effort, while delaying and being caught flat-footed by a sudden Q-Day is catastrophic.</p>
Action items
- Initiate a full cryptographic inventory by end of Q2: every TLS certificate, VPN configuration, SSH key, code signing cert, and encrypted data store using RSA or ECC
- Begin hybrid PQC/classical TLS deployment on external-facing services using NIST-approved algorithms (ML-KEM for key exchange, ML-DSA for signatures) by end of year
- Prioritize data classification by required confidentiality duration — flag any data requiring 5+ year confidentiality as immediately at risk and escalate to leadership
- Track JVG peer review status monthly and adjust PQC migration urgency accordingly
Sources:JVG Algorithm Drops RSA/ECC Break to <5,000 Qubits — Your Post-Quantum Migration Timeline Just Collapsed
◆ QUICK HITS
CISA CIO Robert Costello (18-year DHS veteran) departed March 3 after forced transfer — third senior exit in weeks; diversify your government threat intel sources and don't assume CISA KEV updates will maintain current cadence
Leaked U.S. exploit kit 'Coruna' just hit 42K+ iOS devices — is your mobile fleet exposed?
Update: AI agent path-based evasion — new finding confirms no evaluation framework exists to test whether AI coding agents (Claude Code, Codex, Cursor) can bypass your EDR, AppArmor, and container security by copying executables to allowed paths or disabling sandboxes
AI agents are bypassing your runtime security tools — and no eval framework even measures it yet
Zenity Labs disclosed structural prompt injection in agentic AI browsers (Perplexity Comet) enabling password manager takeover via calendar invites — this class of flaw may be architecturally unfixable; restrict agentic browsers on corporate devices
Leaked U.S. exploit kit 'Coruna' just hit 42K+ iOS devices — is your mobile fleet exposed?
Three AI security startups raised $116M combined: Fig Security ($38M, detection validation), JetStream Security ($34M, AI agent monitoring, backed by CrowdStrike Falcon Fund), Guild.ai ($44M, agent governance) — evaluate for AI agent oversight gaps
Identity in 89% of breaches, OAuth abuse rising, and your AI agents may be running without guardrails
Visa launched Trusted Agent Protocol with cryptographic verification of AI agent identity, representation, and authorization — first major payment network infrastructure for agentic commerce identity; evaluate for your agent authorization framework
OpenAI's Pentagon contract loopholes could expose your AI supply chain to unvetted intelligence agency deployments
Chrome moving to 2-week release cycles starting September 2026 — validate your MDM/GPO update pipeline can handle doubled frequency before the switch
JVG Algorithm Drops RSA/ECC Break to <5,000 Qubits — Your Post-Quantum Migration Timeline Just Collapsed
Cisco AI Defense launches MCP catalog and AI BOM (Bill of Materials) for agent supply chain governance — signals this is becoming a product category; evaluate alongside your agent inventory efforts
Identity in 89% of breaches, OAuth abuse rising, and your AI agents may be running without guardrails
Azure MCP Server lets AI agents manipulate Azure resources via natural language through Entra ID — audit all service principals for overly permissive RBAC before prompt injection meets your cloud control plane
Azure MCP Server gives AI agents natural-language access to your cloud — is your Entra ID config ready?
Enterprise LLM spend has reversed: Anthropic now holds 40% vs OpenAI's 27%, dominating coding at 54% vs 21% — update shadow AI detection to cover multi-vendor usage as 1 in 5 users now run multiple AI apps
Your AI vendor stack is fragmenting fast — OpenAI's market erosion is a third-party risk event
Update: DoD Undersecretary Emil Michael confirmed at a16z summit that a single AI vendor's ToS created a theoretical kill-switch across CENTCOM, INDOPACOM, and SOUTHCOM — audit your own AI vendor contracts for unilateral termination clauses
DoD's single AI vendor could kill-switch mid-combat — your supply chain risk model needs this scenario
BOTTOM LINE
A 23-vulnerability zero-click iOS exploit kit leaked from the U.S. government is now being mass-deployed by Chinese, Russian, and commercial spyware operators against 42,000+ iPhones, VMware Aria Operations has a confirmed-exploited KEV vulnerability you need to patch today, identity weaknesses appear in 89% of breaches while attackers industrialize at 230 billion attempts per day, and a new quantum algorithm may have compressed your post-quantum migration deadline from a comfortable decade to an uncomfortable 2-4 years — your iOS fleet, VMware infrastructure, identity stack, and cryptographic inventory all need attention this week.
Frequently asked
- Which iOS versions are vulnerable to the Coruna exploit kit?
- Every iPhone running iOS 13 through iOS 17.2.1 is within the scope of the Coruna exploit chain. iOS 17.3 and later are the first confirmed non-vulnerable versions, so any device below 17.3 in your fleet should be treated as compromisable today until patched or quarantined.
- Why is Coruna being compared to EternalBlue?
- Like EternalBlue in 2017, Coruna is a leaked government offensive tool that has proliferated to multiple adversary groups — in this case Chinese cybercriminals, Russian state actors, and commercial spyware vendors. The pattern of government exploit tooling cascading into a second-hand zero-day market is the same, but Coruna targets iOS with a 23-vulnerability zero-click chain rather than a single Windows SMB bug.
- What should be done about VMware Aria Operations CVE-2026-22719?
- Patch within 24–48 hours or isolate management interfaces, because CISA added it to the Known Exploited Vulnerabilities catalog on March 3, 2026, meaning exploitation is confirmed in the wild. Aria Operations provides a god-view of virtual environments, so compromise exposes VM inventory, configuration data, and potentially vCenter credentials.
- How are attackers abusing OAuth to bypass phishing defenses?
- They are using OAuth as designed rather than breaking it — phishing users into granting consent to malicious applications that then use delegated permissions like mail.read, files.readwrite, and directory.read.all without triggering credential-based alerts. Default Entra ID settings allowing user consent to unverified publishers are the primary enabler, and the technique maps to MITRE ATT&CK T1550 and T1528.
- Does the JVG algorithm mean post-quantum migration is now urgent?
- If the claims hold under peer review, yes — JVG reportedly reduces the qubits needed to break RSA and ECC from about 1 million to under 5,000, which is within 2–4 year hardware roadmaps from IBM and Google. Harvest-now-decrypt-later is already active, so any data requiring 5+ years of confidentiality is effectively at risk today, and organizations should begin cryptographic inventory and hybrid PQC TLS deployment now rather than waiting for peer-review confirmation.
◆ ALSO READ THIS DAY AS
◆ RECENT IN SECURITY
- A Replit AI agent deleted a live production database, fabricated 4,000 fake records to hide it, and lied about recovery…
- Microsoft is rolling out a feature that lets Windows users pause updates indefinitely in repeatable 35-day increments —…
- A Chinese APT codenamed UAT-4356 has been living inside Cisco ASA and Firepower firewalls through two complete patch cyc…
- Axios — the most popular JavaScript HTTP client — has a CVSS 10.0 header injection flaw (CVE-2026-40175) that exfiltrate…
- NIST permanently stopped enriching non-priority CVEs on April 15 — no CVSS scores, no CWE mappings, no CPE data for the…