{"id":3104948,"date":"2026-03-23T13:42:41","date_gmt":"2026-03-23T20:42:41","guid":{"rendered":"https:\/\/techcrunch.com\/?p=3104948"},"modified":"2026-03-23T14:30:57","modified_gmt":"2026-03-23T21:30:57","slug":"someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones","status":"publish","type":"post","link":"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/","title":{"rendered":"Someone has publicly leaked an exploit kit that can hack millions of iPhones"},"content":{"rendered":"\n<p id=\"speakable-summary\" class=\"wp-block-paragraph\">Last week, cybersecurity researchers <a href=\"https:\/\/techcrunch.com\/2026\/03\/18\/russians-caught-stealing-personal-data-from-ukrainians-with-new-advanced-iphone-hacking-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">uncovered a hacking campaign targeting iPhone users<\/a> that used an advanced hacking tool called DarkSword. Now someone has leaked a newer version of DarkSword and published it on the code-sharing site GitHub.<\/p>\n\n<p class=\"wp-block-paragraph\">Researchers are warning that this will allow any hacker to easily use the tools to target iPhone users running older versions of Apple&#8217;s operating systems who have not yet updated to its latest iOS 26 software. This likely affects hundreds of millions of actively used iPhones and iPads, according to Apple\u2019s own data on out-of-date devices.<\/p>\n\n<p class=\"wp-block-paragraph\">\u201cThis is bad. They are way too easy to repurpose,\u201d Matthias Frielingsdorf, the co-founder of mobile security startup iVerify, told TechCrunch on Monday. \u201cI don\u2019t think that can be contained anymore. So we need to expect criminals and others to start deploying this.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\">Frielingsdorf said that these new versions of DarkSword spyware share the same infrastructure with the ones he and his iVerify colleagues <a href=\"https:\/\/iverify.io\/blog\/darksword-ios-exploit-kit-explained\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">analyzed previously<\/a>, although the files are slightly different. The files uploaded to GitHub are uncomplicated, just HTML and JavaScript, he said, meaning anyone can copy and paste them and host them on a server \u201cin a couple minutes to hours.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\">\u201cThe exploits will work out of the box,\u201d Frielingsdorf said. \u201cThere is no iOS expertise required.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\">Kimberly Samra, a spokesperson for Google, which previously <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/darksword-ios-exploit-chain\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">analyzed the DarkSword exploit<\/a>, said the company\u2019s researchers agree with Frielingsdorf\u2019s assessment.\u00a0<\/p>\n<p class=\"wp-block-shortcode\">\t\t<div class=\"article-block block--callout block--right has-green-500-background-color\" >\n\t\t\t<h4 class=\"block--callout__title\">Contact Us<\/h4>\n\t\t\tDo you have more information about Darksword, Coruna, or other government hacking and spyware tools? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or <a href=\"mailto:lorenzo@techcrunch.com\/\">by email<\/a><a href=\"mailto:lorenzo@techcrunch.com\/\">.<\/a> \t\t<\/div>\n\t\t<\/p>\n\n<p class=\"wp-block-paragraph\">A security hobbyist who goes by the handle matteyeux also told TechCrunch that it is indeed trivial to use the leaked DarkSword samples. Matteyeux <a href=\"https:\/\/x.com\/matteyeux\/status\/2035994616504226140\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">wrote<\/a> in a post on X Monday that he was able to hack an iPad mini tablet running iOS 18, the previous generation of the operating system that is vulnerable to DarkSword, using the \u201cin the wild\u201d DarkSword sample that is circulating online.\u00a0<\/p>\n<div class=\"wp-block-techcrunch-inline-cta\">\n\t<div class=\"inline-cta__wrapper\">\n\t\t<div class=\"inline-cta__logo\">\n\t\t\t<svg aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"41\" height=\"20\" fill=\"none\" viewBox=\"0 0 41 20\"><path fill=\"#fff\" d=\"M0 0v6.452h7.097V20h7.097V6.452h6.451V0zM27.742 13.548V6.452h-7.097V20h20v-6.452zM40.645 0H27.742v6.452h12.903z\"\/><\/svg>\t\t<\/div>\n\t\t<div class=\"inline-cta__flag\">Techcrunch event<\/div>\n\t\t<div class=\"inline-cta__content\">\n\t\t\t<div class=\"inline-cta__header-container\">\n\t\t\t\t<div class=\"inline-cta__header-container-desktop\">\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"inline-cta__header has-h-5-font-size\">Meet your next investor or portfolio startup at Disrupt<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"inline-cta__subheader\"><br>Your next round. Your next hire. Your next breakout opportunity. Find it at TechCrunch Disrupt 2026, where 10,000+ founders, investors, and tech leaders gather for three days of 250+ tactical sessions, powerful introductions, and market-defining innovation. Register now to save up to $410.<\/h4>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"inline-cta__header-container-mobile\">\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"inline-cta__header has-h-5-font-size\">Meet your next investor or portfolio startup at Disrupt<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"inline-cta__subheader\"><br>Your next round. Your next hire. Your next breakout opportunity. Find it at TechCrunch Disrupt 2026, where 10,000+ founders, investors, and tech leaders gather for three days of 250+ tactical sessions, powerful introductions, and market-defining innovation. Register now to save up to $410.<\/h4>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"inline-cta__event-info\">\n\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__location\">San Francisco, CA<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__separator\">|<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__date\">October 13-15, 2026<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"inline-cta__register-button\">\n\t\t\t\t\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a data-ctaText=\"REGISTER NOW\" data-destinationLink=\"https:\/\/techcrunch.com\/events\/tc-disrupt-2026\/?utm_source=tc&amp;utm_medium=ad&amp;utm_campaign=disrupt2026&amp;utm_content=tc_inline_eb&amp;promo=tc_inline_eb&amp;display=\" data-event=\"button\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/techcrunch.com\/events\/tc-disrupt-2026\/?utm_source=tc&amp;utm_medium=ad&amp;utm_campaign=disrupt2026&amp;utm_content=tc_inline_eb&amp;promo=tc_inline_eb&amp;display=\" target=\"_blank\" rel=\"noreferrer noopener\">REGISTER NOW<\/a><\/div>\n<\/div>\n\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<p class=\"wp-block-paragraph\">Apple spokesperson Sarah O&#8217;Rourke told TechCrunch that the company was aware of the exploit targeting devices running older and out-of-date operating systems and issued an emergency update on March 11 for devices unable to run recent versions of iOS.\u00a0<\/p>\n\n<p class=\"wp-block-paragraph\">&#8220;Keeping your software up to date is the single most important thing you can do to maintain the security of your Apple products,\u201d O\u2019Rourke said, adding that devices with updated software were not at risk from these reported attacks and that <a href=\"https:\/\/techcrunch.com\/2023\/12\/07\/apple-says-it-is-not-aware-anyone-using-lockdown-mode-got-hacked\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lockdown Mode<\/a> would also block these specific attacks.<\/p>\n\n<p class=\"wp-block-paragraph\">A spokesperson for Microsoft, which owns GitHub, did not immediately respond to a request for comment.<\/p>\n\n<p class=\"wp-block-paragraph\">The code, which TechCrunch is not linking to, as it can be used in active attacks, contains several comments that describe how the exploits work and how to implement them.\u00a0<\/p>\n\n<p class=\"wp-block-paragraph\">One comment, likely written by one of the developers who worked on DarkSword, says that the exploit &#8220;reads and exfiltrates forensically-relevant files from iOS devices via HTTP,&#8221; referring to stealing information from a person&#8217;s iPhone or iPad and sending the data over the internet to an attacker-controlled server.&nbsp;<\/p>\n\n<p class=\"wp-block-paragraph\">&#8220;This payload should be injected into a process with filesystem access class,&#8221; the comment reads.<\/p>\n\n<p class=\"wp-block-paragraph\">In one case, the code references &#8220;post-exploitation activity&#8221; and describes process after the malware has gained access to the person&#8217;s phone and grabs its contents, including their contacts, messages, call history, and iOS keychain, which stores Wi-Fi passwords and other secrets, and dumps them into a remote server.<\/p>\n\n<p class=\"wp-block-paragraph\">Another file contains references to uploading data to a popular Ukrainian apparel website, though TechCrunch could not immediately determine why. DarkSword was <a href=\"https:\/\/techcrunch.com\/2026\/03\/18\/russians-caught-stealing-personal-data-from-ukrainians-with-new-advanced-iphone-hacking-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">allegedly used by Russian government<\/a> hackers against Ukrainian targets.\u00a0<\/p>\n\n<p class=\"wp-block-paragraph\">This particular spyware works specifically against iPhones and iPads running iOS 18, according to iVerify, <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/darksword-ios-exploit-chain\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Google<\/a>, and <a href=\"https:\/\/www.lookout.com\/blog\/darksword\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Lookout<\/a>, which also previously analyzed the DarkSword malware.<\/p>\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/developer.apple.com\/support\/app-store\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">According to Apple&#8217;s own numbers<\/a>, about one-quarter of all iPhone and iPad users are still running iOS 18 or earlier on their device. With <a href=\"https:\/\/www.apple.com\/newsroom\/2026\/01\/apple-reports-first-quarter-results\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">more than 2.5 billion<\/a> active devices, that likely equates to hundreds of millions of people whose devices are vulnerable to DarkSword attacks.\u00a0\u00a0<\/p>\n\n<p class=\"wp-block-paragraph\">That\u2019s why Frielingsdorf recommends everyone upgrade their iPhone\u2019s operating system.\u00a0<\/p>\n\n<p class=\"wp-block-paragraph\">The discovery of DarkSword came only a few weeks after researchers discovered another advanced iPhone hacking toolkit <a href=\"https:\/\/techcrunch.com\/2026\/03\/03\/a-suite-of-government-hacking-tools-targeting-iphones-is-now-being-used-by-cybercriminals\/\" target=\"_blank\" rel=\"noreferrer noopener\">known as Coruna<\/a>. As TechCrunch reported, <a href=\"https:\/\/techcrunch.com\/2026\/03\/10\/us-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine\/\" target=\"_blank\" rel=\"noreferrer noopener\">Coruna was originally developed<\/a> by the defense contractor L3Harris, whose Trenchant division makes hacking tools for the U.S. government and its allies.<\/p>\n\n<p class=\"wp-block-paragraph\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Leaked &#8220;DarkSword&#8221; exploits published to GitHub allow hackers and cybercriminals to target iPhone users running old versions of iOS with spyware, according to cybersecurity researchers. <\/p>\n","protected":false},"author":133574594,"featured_media":2659887,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"tc-featured-article":false,"tc-header-option":"","tc-breaking-news":false,"tc-article-brief":false,"carmot_uuid":"","apple_news_api_created_at":"2026-03-23T20:42:48Z","apple_news_api_id":"aecf91e2-8d13-48b1-ab79-575328265ae4","apple_news_api_modified_at":"2026-03-23T21:24:17Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAAAA==","apple_news_api_share_url":"https:\/\/apple.news\/Ars-R4o0TSLGreVdTKCZa5A","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":[],"apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"tc_subtitle":"","tc_featured_image_disabled":false,"tc_exclude_from_rss_feed":false,"tc_exclude_from_content_rivers":false,"footnotes":""},"categories":[21587494],"tags":[291,61188,106595,5603054,1816,22376,965824,51751,577309635,577370714],"tc_region":[],"tc_event":[],"tc_storyline_tax":[],"coauthors":[577104450,576607994],"class_list":["post-3104948","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-apple","tag-hackers","tag-iphone","tag-github","tag-hacking","tag-exclusive","tag-cybersecurity","tag-cybercrime","tag-iverify","tag-darksword"],"apple_news_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.1 (Yoast SEO v25.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Someone has publicly leaked an exploit kit that can hack millions of iPhones | TechCrunch<\/title>\n<meta name=\"description\" content=\"Leaked &quot;DarkSword&quot; exploits published to GitHub allow hackers and cybercriminals to target iPhone users running old versions of iOS with spyware, according to cybersecurity researchers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Someone has publicly leaked an exploit kit that can hack millions of iPhones | TechCrunch\" \/>\n<meta property=\"og:description\" content=\"Leaked &quot;DarkSword&quot; exploits published to GitHub allow hackers and cybercriminals to target iPhone users running old versions of iOS with spyware, according to cybersecurity researchers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/\" \/>\n<meta property=\"og:site_name\" content=\"TechCrunch\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/techcrunch\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-23T20:42:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-23T21:30:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/iphone-jailbreak.jpg?resize=1200,800\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lorenzo Franceschi-Bicchierai, Zack Whittaker\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechCrunch\" \/>\n<meta name=\"twitter:site\" content=\"@TechCrunch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lorenzo Franceschi-Bicchierai, Zack Whittaker\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/\"},\"author\":{\"name\":\"Lorenzo Franceschi-Bicchierai\",\"@id\":\"https:\/\/techcrunch.com\/#\/schema\/person\/ae6736172fc69d49ba9b3d836e93d029\"},\"headline\":\"Someone has publicly leaked an exploit kit that can hack millions of iPhones\",\"datePublished\":\"2026-03-23T20:42:41+00:00\",\"dateModified\":\"2026-03-23T21:30:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/\"},\"wordCount\":770,\"publisher\":{\"@id\":\"https:\/\/techcrunch.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/iphone-jailbreak.jpg\",\"keywords\":[\"Apple\",\"hackers\",\"iPhone\",\"GitHub\",\"hacking\",\"Exclusive\",\"cybersecurity\",\"cybercrime\",\"iverify\",\"Darksword\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2026\",\"copyrightHolder\":{\"@id\":\"https:\/\/techcrunch.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/\",\"url\":\"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/\",\"name\":\"Someone has publicly leaked an exploit kit that can hack millions of iPhones | TechCrunch\",\"isPartOf\":{\"@id\":\"https:\/\/techcrunch.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/iphone-jailbreak.jpg\",\"datePublished\":\"2026-03-23T20:42:41+00:00\",\"dateModified\":\"2026-03-23T21:30:57+00:00\",\"description\":\"Leaked \\\"DarkSword\\\" exploits published to GitHub allow hackers and cybercriminals to target iPhone users running old versions of iOS with spyware, according to cybersecurity researchers.\",\"breadcrumb\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/#primaryimage\",\"url\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/iphone-jailbreak.jpg\",\"contentUrl\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/iphone-jailbreak.jpg\",\"width\":3000,\"height\":2001,\"caption\":\"Smashed Iphones are seen during COP28 in Dubai, United Arab Emirates on November 30, 2023.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/techcrunch.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Someone has publicly leaked an exploit kit that can hack millions of iPhones\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/techcrunch.com\/#website\",\"url\":\"https:\/\/techcrunch.com\/\",\"name\":\"TechCrunch\",\"description\":\"Startup and Technology News\",\"publisher\":{\"@id\":\"https:\/\/techcrunch.com\/#organization\"},\"alternateName\":\"TC\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/techcrunch.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/techcrunch.com\/#organization\",\"name\":\"TechCrunch\",\"alternateName\":\"TC\",\"url\":\"https:\/\/techcrunch.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/techcrunch.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2018\/04\/tc-logo-2018-square-reverse2x.png?resize=1200,1200\",\"contentUrl\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2018\/04\/tc-logo-2018-square-reverse2x.png?resize=1200,1200\",\"width\":1200,\"height\":1200,\"caption\":\"TechCrunch\"},\"image\":{\"@id\":\"https:\/\/techcrunch.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/techcrunch\",\"https:\/\/x.com\/TechCrunch\",\"https:\/\/mstdn.social\/@TechCrunch\",\"https:\/\/bsky.app\/profile\/techcrunch.com\",\"https:\/\/www.threads.net\/@techcrunch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/techcrunch.com\/#\/schema\/person\/ae6736172fc69d49ba9b3d836e93d029\",\"name\":\"Lorenzo Franceschi-Bicchierai\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/techcrunch.com\/#\/schema\/person\/image\/e5c2a45b56c8d08b18a46cf3571af0fc\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/675be9c00f9239b767b25cc470ba3878e035e319722e04170747562fd77e0d42?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/675be9c00f9239b767b25cc470ba3878e035e319722e04170747562fd77e0d42?s=96&d=identicon&r=g\",\"caption\":\"Lorenzo Franceschi-Bicchierai\"},\"url\":\"https:\/\/techcrunch.com\/author\/lorenzo-franceschi-bicchierai\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Someone has publicly leaked an exploit kit that can hack millions of iPhones | TechCrunch","description":"Leaked \"DarkSword\" exploits published to GitHub allow hackers and cybercriminals to target iPhone users running old versions of iOS with spyware, according to cybersecurity researchers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/","og_locale":"en_US","og_type":"article","og_title":"Someone has publicly leaked an exploit kit that can hack millions of iPhones | TechCrunch","og_description":"Leaked \"DarkSword\" exploits published to GitHub allow hackers and cybercriminals to target iPhone users running old versions of iOS with spyware, according to cybersecurity researchers.","og_url":"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/","og_site_name":"TechCrunch","article_publisher":"https:\/\/www.facebook.com\/techcrunch","article_published_time":"2026-03-23T20:42:41+00:00","article_modified_time":"2026-03-23T21:30:57+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/iphone-jailbreak.jpg?resize=1200,800","type":"image\/jpeg"}],"author":"Lorenzo Franceschi-Bicchierai, Zack Whittaker","twitter_card":"summary_large_image","twitter_creator":"@TechCrunch","twitter_site":"@TechCrunch","twitter_misc":{"Written by":"Lorenzo Franceschi-Bicchierai, Zack Whittaker","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/#article","isPartOf":{"@id":"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/"},"author":{"name":"Lorenzo Franceschi-Bicchierai","@id":"https:\/\/techcrunch.com\/#\/schema\/person\/ae6736172fc69d49ba9b3d836e93d029"},"headline":"Someone has publicly leaked an exploit kit that can hack millions of iPhones","datePublished":"2026-03-23T20:42:41+00:00","dateModified":"2026-03-23T21:30:57+00:00","mainEntityOfPage":{"@id":"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/"},"wordCount":770,"publisher":{"@id":"https:\/\/techcrunch.com\/#organization"},"image":{"@id":"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/#primaryimage"},"thumbnailUrl":"https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/iphone-jailbreak.jpg","keywords":["Apple","hackers","iPhone","GitHub","hacking","Exclusive","cybersecurity","cybercrime","iverify","Darksword"],"articleSection":["Security"],"inLanguage":"en-US","copyrightYear":"2026","copyrightHolder":{"@id":"https:\/\/techcrunch.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/","url":"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/","name":"Someone has publicly leaked an exploit kit that can hack millions of iPhones | TechCrunch","isPartOf":{"@id":"https:\/\/techcrunch.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/#primaryimage"},"image":{"@id":"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/#primaryimage"},"thumbnailUrl":"https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/iphone-jailbreak.jpg","datePublished":"2026-03-23T20:42:41+00:00","dateModified":"2026-03-23T21:30:57+00:00","description":"Leaked \"DarkSword\" exploits published to GitHub allow hackers and cybercriminals to target iPhone users running old versions of iOS with spyware, according to cybersecurity researchers.","breadcrumb":{"@id":"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/#primaryimage","url":"https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/iphone-jailbreak.jpg","contentUrl":"https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/iphone-jailbreak.jpg","width":3000,"height":2001,"caption":"Smashed Iphones are seen during COP28 in Dubai, United Arab Emirates on November 30, 2023."},{"@type":"BreadcrumbList","@id":"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/techcrunch.com\/"},{"@type":"ListItem","position":2,"name":"Someone has publicly leaked an exploit kit that can hack millions of iPhones"}]},{"@type":"WebSite","@id":"https:\/\/techcrunch.com\/#website","url":"https:\/\/techcrunch.com\/","name":"TechCrunch","description":"Startup and Technology News","publisher":{"@id":"https:\/\/techcrunch.com\/#organization"},"alternateName":"TC","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/techcrunch.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/techcrunch.com\/#organization","name":"TechCrunch","alternateName":"TC","url":"https:\/\/techcrunch.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techcrunch.com\/#\/schema\/logo\/image\/","url":"https:\/\/techcrunch.com\/wp-content\/uploads\/2018\/04\/tc-logo-2018-square-reverse2x.png?resize=1200,1200","contentUrl":"https:\/\/techcrunch.com\/wp-content\/uploads\/2018\/04\/tc-logo-2018-square-reverse2x.png?resize=1200,1200","width":1200,"height":1200,"caption":"TechCrunch"},"image":{"@id":"https:\/\/techcrunch.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/techcrunch","https:\/\/x.com\/TechCrunch","https:\/\/mstdn.social\/@TechCrunch","https:\/\/bsky.app\/profile\/techcrunch.com","https:\/\/www.threads.net\/@techcrunch"]},{"@type":"Person","@id":"https:\/\/techcrunch.com\/#\/schema\/person\/ae6736172fc69d49ba9b3d836e93d029","name":"Lorenzo Franceschi-Bicchierai","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techcrunch.com\/#\/schema\/person\/image\/e5c2a45b56c8d08b18a46cf3571af0fc","url":"https:\/\/secure.gravatar.com\/avatar\/675be9c00f9239b767b25cc470ba3878e035e319722e04170747562fd77e0d42?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/675be9c00f9239b767b25cc470ba3878e035e319722e04170747562fd77e0d42?s=96&d=identicon&r=g","caption":"Lorenzo Franceschi-Bicchierai"},"url":"https:\/\/techcrunch.com\/author\/lorenzo-franceschi-bicchierai\/"}]}},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Someone has publicly leaked an exploit kit that can hack millions of iPhones","url":"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/"},"thumbnailUrl":"https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/iphone-jailbreak.jpg?w=150","image":{"@type":"ImageObject","url":"https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/iphone-jailbreak.jpg"},"articleSection":"Security","author":[{"@type":"Person","name":"Lorenzo Franceschi-Bicchierai"},{"@type":"Person","name":"Zack Whittaker"}],"creator":["Lorenzo Franceschi-Bicchierai","Zack Whittaker"],"publisher":{"@type":"Organization","name":"TechCrunch","logo":"https:\/\/techcrunch.com\/wp-content\/uploads\/2015\/02\/cropped-cropped-favicon-gradient.png"},"keywords":["apple","hackers","iphone","github","hacking","exclusive","cybersecurity","cybercrime","iverify","darksword"],"dateCreated":"2026-03-23T20:42:41Z","datePublished":"2026-03-23T20:42:41Z","dateModified":"2026-03-23T21:30:57Z"},"rendered":"<meta name=\"parsely-title\" content=\"Someone has publicly leaked an exploit kit that can hack millions of iPhones\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/iphone-jailbreak.jpg?w=150\" \/>\n<meta name=\"parsely-pub-date\" content=\"2026-03-23T20:42:41Z\" \/>\n<meta name=\"parsely-section\" content=\"Security\" \/>\n<meta name=\"parsely-tags\" content=\"apple,hackers,iphone,github,hacking,exclusive,cybersecurity,cybercrime,iverify,darksword\" \/>\n<meta name=\"parsely-author\" content=\"Lorenzo Franceschi-Bicchierai\" \/>\n<meta name=\"parsely-author\" content=\"Zack Whittaker\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/techcrunch.com\/p.js"},"jetpack_featured_media_url":"https:\/\/techcrunch.com\/wp-content\/uploads\/2024\/02\/iphone-jailbreak.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/posts\/3104948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/users\/133574594"}],"replies":[{"embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/comments?post=3104948"}],"version-history":[{"count":5,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/posts\/3104948\/revisions"}],"predecessor-version":[{"id":3105092,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/posts\/3104948\/revisions\/3105092"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/media\/2659887"}],"wp:attachment":[{"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/media?parent=3104948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/categories?post=3104948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/tags?post=3104948"},{"taxonomy":"tc_region","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/tc_region?post=3104948"},{"taxonomy":"tc_event","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/tc_event?post=3104948"},{"taxonomy":"tc_storyline_tax","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/tc_storyline_tax?post=3104948"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/coauthors?post=3104948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}