Google Exposes 'Coruna' iPhone Exploit Kit Targeting Crypto Wallet Seed Phrases

2 hour ago 3 sources negative

Key takeaways:

  • Sophisticated iPhone exploits targeting crypto wallets highlight growing security risks for mobile-based investors.
  • Repurposing of state-level cyber tools signals increased threat sophistication requiring proactive security updates.
  • Targeting of Uniswap and MetaMask suggests attackers are focusing on high-value DeFi and Web3 users.

Google's Threat Intelligence Group (GTIG) has uncovered a sophisticated and powerful new exploit kit, dubbed "Coruna," specifically designed to target Apple iPhone users and steal cryptocurrency wallet seed phrases. The kit, which contains five full iOS exploit chains and a total of 23 exploits, targets iPhones running iOS versions 13.0 up to 17.2.1, utilizing some vulnerabilities previously unknown to the public.

GTIG first discovered the kit in February 2025, initially tracking its use by a suspected Russian espionage group against Ukrainian targets. By December 2025, the same framework was found deployed on a large set of fake Chinese websites, many related to finance, including one spoofing the crypto exchange WEEX. When a user visits these sites with a vulnerable iOS device, the kit is delivered and actively hunts for financial information, scanning text for seed phrases and keywords like "backup phrase" or "bank account."

The exploit kit also specifically seeks out popular crypto applications such as Uniswap and MetaMask to extract crypto assets or sensitive data. Google emphasizes that the kit does not work on the latest version of iOS and strongly urges all iPhone users to update their devices to the newest software. If updating is not possible, enabling Apple's "Lockdown Mode" is recommended to counter such sophisticated attacks.

The origins of the Coruna kit are debated within the security community. Mobile security firm iVerify suggested to WIRED that the toolkit's sophistication—requiring millions of dollars to develop—and its code hallmarks point to a likely origin within the U.S. government, marking a concerning case of government-grade tools being repurposed by adversaries and cybercriminals. However, researchers from Kaspersky have stated they saw no direct evidence in published reports to support attributing the code to the same authors.

Disclaimer

The content on this website is provided for information purposes only and does not constitute investment advice, an offer, or professional consultation. Crypto assets are high-risk and volatile — you may lose all funds. Some materials may include summaries and links to third-party sources; we are not responsible for their content or accuracy. Any decisions you make are at your own risk. Coinalertnews recommends independently verifying information and consulting with a professional before making any financial decisions based on this content.