DarkSword Malware Threatens Millions of iPhones: How to Protect Your Device
DarkSword Malware Targets iPhones: Protection Guide

DarkSword: The Stealthy iOS Malware Threatening iPhone Security

Smartphones are designed to simplify our lives, but a new and potent threat known as DarkSword is highlighting a disturbing reality for iPhone users. Simply browsing the internet could expose your device to this advanced malware, which operates silently and efficiently to compromise your personal data.

Understanding the DarkSword Exploit Kit

DarkSword represents a sophisticated iOS exploit kit that leverages six critical vulnerabilities within the operating system, including several zero-day flaws. According to security firm Lookout, this malware primarily targets iPhones running iOS versions 18.4 through 18.7. Its technical prowess allows it to escape the browser's sandbox environment and gain kernel-level access to the device.

The attack methodology typically involves a "watering hole" strategy, where cybercriminals inject malicious code into legitimate websites. When a vulnerable iPhone visits one of these compromised pages, the exploit executes automatically without requiring any user interaction, such as clicking an installation prompt. This stealth approach makes DarkSword particularly dangerous compared to more obvious malware types.

Wide Pickt banner — collaborative shopping lists app for Telegram, phone mockup with grocery list

Which iPhone Models Are Vulnerable?

Security analyses from PCMag and iVerify indicate that DarkSword mainly affects iPhones operating on iOS 18.4 to 18.7, with some campaigns potentially extending to versions up to 18.6.2 or 18.7. Although Apple has addressed these security flaws in subsequent iOS updates released in late 2025 and early 2026, a significant number of users have delayed installing these critical patches.

Based on public adoption data, security experts estimate that approximately 220 million to 270 million iPhones worldwide still operate within this vulnerable version range. While not every device will be targeted, any iPhone in this category that accesses a compromised website faces substantial risk, especially if used for sensitive activities like online banking, messaging, or cryptocurrency transactions.

The Actors Behind DarkSword Attacks

Research has connected DarkSword to multiple threat actors with varying motivations. Google's Threat Intelligence Group has identified a suspected Russian espionage collective called UNC6353 utilizing DarkSword in watering-hole attacks against Ukrainian websites, including news portals and government platforms. These campaigns, active since at least late 2025, suggest the tool is being employed for state-sponsored espionage rather than mere financial crime.

Additionally, commercial surveillance vendors have been deploying the DarkSword exploit kit against users in countries such as Saudi Arabia, Turkey, and Malaysia. This development indicates that DarkSword, originally a tool for elite or state-linked groups, has proliferated into a broader marketplace where governments, intelligence agencies, and cybercriminals can all purchase access to these powerful iOS-hacking capabilities.

DarkSword in Context: The Evolving iOS Threat Landscape

DarkSword is not the first significant iOS exploit kit to emerge in 2026. Just weeks earlier, on March 3, 2026, Google and iVerify disclosed Coruna, another advanced exploit kit that utilized 23 vulnerabilities to attack devices running iOS 13 through 17.2.1.

Researchers have noted that DarkSword shares certain infrastructure and attack patterns with Coruna campaigns, suggesting involvement from the same broader ecosystem of exploit developers and users. While Coruna focused on older iOS versions, DarkSword shifts attention to newer, widely-used iOS 18 builds, demonstrating how advanced spyware continuously evolves to exploit the latest software versions that people actually use.

Essential Protection Measures for iPhone Users

Immediate iOS Updates: The most crucial protective step is to update your iPhone to the latest iOS version without delay. According to Apple's security guidance, timely software updates are the primary method to close the vulnerabilities that exploit kits like DarkSword depend upon.

Enable Lockdown Mode: Security teams strongly recommend that high-risk individuals—including journalists, activists, and business executives—activate Lockdown Mode. This feature enhances Safari restrictions and blocks numerous advanced attack vectors.

Pickt after-article banner — collaborative shopping lists app with family illustration

Additional Security Practices:

  • Avoid clicking suspicious links, particularly those received through messages or emails
  • Consider utilizing specialized detection tools such as iVerify to monitor for unusual device activity
  • Maintain awareness of current cybersecurity threats and best practices

The emergence of DarkSword underscores the persistent and evolving nature of mobile security threats. By implementing these protective measures and maintaining updated software, iPhone users can significantly reduce their vulnerability to this sophisticated malware and similar future threats.