{"id":3106277,"date":"2026-03-26T10:22:01","date_gmt":"2026-03-26T17:22:01","guid":{"rendered":"https:\/\/techcrunch.com\/?p=3106277"},"modified":"2026-03-26T11:07:45","modified_gmt":"2026-03-26T18:07:45","slug":"apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks","status":"publish","type":"post","link":"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/","title":{"rendered":"Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks"},"content":{"rendered":"\n<p id=\"speakable-summary\" class=\"wp-block-paragraph\">The common assumption among iPhone security experts has been that finding vulnerabilities and developing exploits for iOS was difficult, requiring a lot of time, resources, and teams of skilled researchers to break through its layers of security defenses. That meant iPhone <a href=\"https:\/\/techcrunch.com\/2025\/04\/25\/techcrunch-reference-guide-to-security-terminology\/#spyware-commercial-government\">spyware<\/a> and <a href=\"https:\/\/techcrunch.com\/2025\/04\/25\/techcrunch-reference-guide-to-security-terminology\/#zero-day\">zero-day vulnerabilities<\/a>, which aren&#8217;t known to the software vendor before they are exploited, were rare and only used in limited and targeted attacks, <a href=\"https:\/\/support.apple.com\/en-us\/102174#:~:text=Such%20attacks%20are,by%20such%20attacks.\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">as Apple itself says<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">But in the last month, cybersecurity researchers at Google, iVerify, and Lookout have documented several broad-scale hacking campaigns using tools, known as <a href=\"https:\/\/techcrunch.com\/2026\/03\/03\/a-suite-of-government-hacking-tools-targeting-iphones-is-now-being-used-by-cybercriminals\/\">Coruna<\/a> and <a href=\"https:\/\/techcrunch.com\/2026\/03\/18\/russians-caught-stealing-personal-data-from-ukrainians-with-new-advanced-iphone-hacking-tools\/\">DarkSword<\/a>, which have been near-indiscriminately targeting victims around the world who are not yet running Apple&#8217;s most up-to-date software. Some of the hackers behind these attacks include Russian spies and Chinese cybercriminals, and target their victims via hacked websites or fake pages, allowing them to potentially steal phone data from a large number of victims.\u00a0<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Now, some of these tools have <a href=\"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/\">leaked online<\/a>, allowing anyone to take the code and easily launch their own attacks against Apple users running older versions of iOS.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Apple has invested significant resources in new security and development technologies, such as introducing memory-safe code for its latest iPhone models, and <a href=\"https:\/\/techcrunch.com\/2025\/12\/29\/youve-been-targeted-by-government-spyware-now-what\/\">launching features like Lockdown Mode<\/a> specifically to counter potential spyware attacks.&nbsp;The goal has been to make modern iPhones more secure, and to strengthen the claim that the iPhone is very hard to hack. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">But there are still a lot of older, out-of-date iPhones that are now easier targets for spyware-wielding spies and cybercriminals.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">There are now essentially two security classes of iPhone users.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Users on the latest iOS 26 running on the most recent iPhone 17 models released in 2025 have <a href=\"https:\/\/techcrunch.com\/2025\/09\/11\/apples-latest-iphone-security-feature-just-made-life-more-difficult-for-spyware-makers\/\">a new security feature called Memory Integrity Enforcement<\/a>, which is designed to stop memory corruption bugs, some of the most commonly exploited flaws used in spyware and phone unlocking attacks. DarkSword relied heavily on memory corruption bugs, <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/darksword-ios-exploit-chain#:~:text=The%20first%20UNC6748,the%20same%20file.\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">according to Google<\/a>.\u00a0<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Then, there are <a href=\"https:\/\/developer.apple.com\/support\/app-store\/#:~:text=74%20of%20all,iOS%2026.\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">iPhone users<\/a> who still run the previous version of Apple&#8217;s mobile software, iOS 18, or even older versions, which have been vulnerable to memory-based hacks and other exploits in the past.\u00a0<\/p>\n\n\n<p class=\"wp-block-shortcode\">\t\t<div class=\"article-block block--callout block--right has-green-500-background-color\" >\n\t\t\t<h4 class=\"block--callout__title\">Contact Us<\/h4>\n\t\t\tDo you have more information about DarkSword, Coruna, or other government hacking and spyware tools? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or <a href=\"mailto:lorenzo@techcrunch.com\/\">by email<\/a><a href=\"mailto:lorenzo@techcrunch.com\/\">.<\/a> \t\t<\/div>\n\t\t<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The discovery of Coruna and DarkSword suggest that memory-based attacks could continue to plague users of older iPhones and iPads that lag behind the newer, more memory-safe models.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Experts working for iVerify and Lookout, two cybersecurity companies that have a commercial stake in selling security products for mobile devices, say Coruna and DarkSword may also challenge the long-held assumption that iPhone hacks are rare.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">iVerify\u2019s co-founder Matthias Frielingsdorf told TechCrunch that mobile attacks are now \u201cwidespread,\u201d but he also said that attacks relying on zero-days against the most up-to-date software \u201cwill always be charged at a premium rate,\u201d implying that these will not be used to hack people on a broad scale.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Patrick Wardle, an Apple security expert, said one problem is that people call attacks against iPhones rare or sophisticated just because they are seldom documented. But the reality, he said, is that these attacks may be out there but are not always caught.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cCalling them \u2018highly advanced\u2019 is a bit like calling tanks or missiles advanced,\u201d Wardle told TechCrunch. \u201cIt\u2019s true, but it misses the point. That\u2019s simply the baseline capability at that level, and all (most) nations have them (or can acquire them for the right price).\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Another problem highlighted by Coruna and DarkSword is that there is now an apparently thriving \u201csecond-hand\u201d market, which creates the financial incentive \u201cfor exploit developers and individual brokers to essentially get paid twice for the same exploit,\u201d according to Justin Albrecht, principal researcher at Lookout.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Especially when the initial exploit gets patched, it makes sense for brokers to resell it before everyone updates.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cThis isn\u2019t a one-time event, but rather a sign of things to come,\u201d Albrecht told TechCrunch.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Leaked hacking tools threaten the security of millions of older iPhones. Cybersecurity experts weigh in.<\/p>\n","protected":false},"author":133574594,"featured_media":3106547,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"tc-featured-article":false,"tc-header-option":"","tc-breaking-news":false,"tc-article-brief":false,"carmot_uuid":"","apple_news_api_created_at":"2026-03-26T17:22:07Z","apple_news_api_id":"d603ed10-98af-46ef-a3f6-098371df9a6b","apple_news_api_modified_at":"2026-03-26T18:07:33Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAAAA==","apple_news_api_share_url":"https:\/\/apple.news\/A1gPtEJivRu-j9gmDcd-aaw","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":[],"apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"tc_subtitle":"","tc_featured_image_disabled":false,"tc_exclude_from_rss_feed":false,"tc_exclude_from_content_rivers":false,"footnotes":""},"categories":[21587494],"tags":[291,81,61188,449557076,1816,324281,278936,10759,5448,965824,577112846,577309635,577370714,577370715],"tc_region":[],"tc_event":[],"tc_storyline_tax":[],"coauthors":[577104450],"class_list":["post-3106277","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-apple","tag-google","tag-hackers","tag-china","tag-hacking","tag-ios","tag-lookout","tag-russia","tag-spyware","tag-cybersecurity","tag-zero-days","tag-iverify","tag-darksword","tag-coruna"],"apple_news_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.1 (Yoast SEO v25.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks | TechCrunch<\/title>\n<meta name=\"description\" content=\"Leaked hacking tools threaten the security of millions of older iPhones. Cybersecurity experts weigh in.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks | TechCrunch\" \/>\n<meta property=\"og:description\" content=\"Leaked hacking tools threaten the security of millions of older iPhones. Cybersecurity experts weigh in.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"TechCrunch\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/techcrunch\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-26T17:22:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-26T18:07:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/03\/broken-iphone-screen-zoomed-in.jpg?resize=1200,800\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lorenzo Franceschi-Bicchierai\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechCrunch\" \/>\n<meta name=\"twitter:site\" content=\"@TechCrunch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lorenzo Franceschi-Bicchierai\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/\"},\"author\":{\"name\":\"Lorenzo Franceschi-Bicchierai\",\"@id\":\"https:\/\/techcrunch.com\/#\/schema\/person\/ae6736172fc69d49ba9b3d836e93d029\"},\"headline\":\"Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks\",\"datePublished\":\"2026-03-26T17:22:01+00:00\",\"dateModified\":\"2026-03-26T18:07:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/\"},\"wordCount\":708,\"publisher\":{\"@id\":\"https:\/\/techcrunch.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/03\/broken-iphone-screen-zoomed-in.jpg\",\"keywords\":[\"Apple\",\"Google\",\"hackers\",\"China\",\"hacking\",\"iOS\",\"Lookout\",\"russia\",\"Spyware\",\"cybersecurity\",\"Zero-days\",\"iverify\",\"Darksword\",\"Coruna\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2026\",\"copyrightHolder\":{\"@id\":\"https:\/\/techcrunch.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/\",\"url\":\"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/\",\"name\":\"Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks | TechCrunch\",\"isPartOf\":{\"@id\":\"https:\/\/techcrunch.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/03\/broken-iphone-screen-zoomed-in.jpg\",\"datePublished\":\"2026-03-26T17:22:01+00:00\",\"dateModified\":\"2026-03-26T18:07:45+00:00\",\"description\":\"Leaked hacking tools threaten the security of millions of older iPhones. Cybersecurity experts weigh in.\",\"breadcrumb\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/#primaryimage\",\"url\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/03\/broken-iphone-screen-zoomed-in.jpg\",\"contentUrl\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/03\/broken-iphone-screen-zoomed-in.jpg\",\"width\":2447,\"height\":1631,\"caption\":\"iPhone screen is seen through the broken glass in this illustration photo taken in Krakow, Poland on April 25, 2024. (Photo by Jakub Porzycki\/NurPhoto via Getty Images)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/techcrunch.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/techcrunch.com\/#website\",\"url\":\"https:\/\/techcrunch.com\/\",\"name\":\"TechCrunch\",\"description\":\"Startup and Technology News\",\"publisher\":{\"@id\":\"https:\/\/techcrunch.com\/#organization\"},\"alternateName\":\"TC\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/techcrunch.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/techcrunch.com\/#organization\",\"name\":\"TechCrunch\",\"alternateName\":\"TC\",\"url\":\"https:\/\/techcrunch.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/techcrunch.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2018\/04\/tc-logo-2018-square-reverse2x.png?resize=1200,1200\",\"contentUrl\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2018\/04\/tc-logo-2018-square-reverse2x.png?resize=1200,1200\",\"width\":1200,\"height\":1200,\"caption\":\"TechCrunch\"},\"image\":{\"@id\":\"https:\/\/techcrunch.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/techcrunch\",\"https:\/\/x.com\/TechCrunch\",\"https:\/\/mstdn.social\/@TechCrunch\",\"https:\/\/bsky.app\/profile\/techcrunch.com\",\"https:\/\/www.threads.net\/@techcrunch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/techcrunch.com\/#\/schema\/person\/ae6736172fc69d49ba9b3d836e93d029\",\"name\":\"Lorenzo Franceschi-Bicchierai\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/techcrunch.com\/#\/schema\/person\/image\/e5c2a45b56c8d08b18a46cf3571af0fc\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/675be9c00f9239b767b25cc470ba3878e035e319722e04170747562fd77e0d42?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/675be9c00f9239b767b25cc470ba3878e035e319722e04170747562fd77e0d42?s=96&d=identicon&r=g\",\"caption\":\"Lorenzo Franceschi-Bicchierai\"},\"url\":\"https:\/\/techcrunch.com\/author\/lorenzo-franceschi-bicchierai\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks | TechCrunch","description":"Leaked hacking tools threaten the security of millions of older iPhones. Cybersecurity experts weigh in.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks | TechCrunch","og_description":"Leaked hacking tools threaten the security of millions of older iPhones. Cybersecurity experts weigh in.","og_url":"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/","og_site_name":"TechCrunch","article_publisher":"https:\/\/www.facebook.com\/techcrunch","article_published_time":"2026-03-26T17:22:01+00:00","article_modified_time":"2026-03-26T18:07:45+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/03\/broken-iphone-screen-zoomed-in.jpg?resize=1200,800","type":"image\/jpeg"}],"author":"Lorenzo Franceschi-Bicchierai","twitter_card":"summary_large_image","twitter_creator":"@TechCrunch","twitter_site":"@TechCrunch","twitter_misc":{"Written by":"Lorenzo Franceschi-Bicchierai","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/#article","isPartOf":{"@id":"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/"},"author":{"name":"Lorenzo Franceschi-Bicchierai","@id":"https:\/\/techcrunch.com\/#\/schema\/person\/ae6736172fc69d49ba9b3d836e93d029"},"headline":"Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks","datePublished":"2026-03-26T17:22:01+00:00","dateModified":"2026-03-26T18:07:45+00:00","mainEntityOfPage":{"@id":"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/"},"wordCount":708,"publisher":{"@id":"https:\/\/techcrunch.com\/#organization"},"image":{"@id":"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/03\/broken-iphone-screen-zoomed-in.jpg","keywords":["Apple","Google","hackers","China","hacking","iOS","Lookout","russia","Spyware","cybersecurity","Zero-days","iverify","Darksword","Coruna"],"articleSection":["Security"],"inLanguage":"en-US","copyrightYear":"2026","copyrightHolder":{"@id":"https:\/\/techcrunch.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/","url":"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/","name":"Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks | TechCrunch","isPartOf":{"@id":"https:\/\/techcrunch.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/#primaryimage"},"image":{"@id":"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/03\/broken-iphone-screen-zoomed-in.jpg","datePublished":"2026-03-26T17:22:01+00:00","dateModified":"2026-03-26T18:07:45+00:00","description":"Leaked hacking tools threaten the security of millions of older iPhones. Cybersecurity experts weigh in.","breadcrumb":{"@id":"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/#primaryimage","url":"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/03\/broken-iphone-screen-zoomed-in.jpg","contentUrl":"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/03\/broken-iphone-screen-zoomed-in.jpg","width":2447,"height":1631,"caption":"iPhone screen is seen through the broken glass in this illustration photo taken in Krakow, Poland on April 25, 2024. (Photo by Jakub Porzycki\/NurPhoto via Getty Images)"},{"@type":"BreadcrumbList","@id":"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/techcrunch.com\/"},{"@type":"ListItem","position":2,"name":"Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks"}]},{"@type":"WebSite","@id":"https:\/\/techcrunch.com\/#website","url":"https:\/\/techcrunch.com\/","name":"TechCrunch","description":"Startup and Technology News","publisher":{"@id":"https:\/\/techcrunch.com\/#organization"},"alternateName":"TC","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/techcrunch.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/techcrunch.com\/#organization","name":"TechCrunch","alternateName":"TC","url":"https:\/\/techcrunch.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techcrunch.com\/#\/schema\/logo\/image\/","url":"https:\/\/techcrunch.com\/wp-content\/uploads\/2018\/04\/tc-logo-2018-square-reverse2x.png?resize=1200,1200","contentUrl":"https:\/\/techcrunch.com\/wp-content\/uploads\/2018\/04\/tc-logo-2018-square-reverse2x.png?resize=1200,1200","width":1200,"height":1200,"caption":"TechCrunch"},"image":{"@id":"https:\/\/techcrunch.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/techcrunch","https:\/\/x.com\/TechCrunch","https:\/\/mstdn.social\/@TechCrunch","https:\/\/bsky.app\/profile\/techcrunch.com","https:\/\/www.threads.net\/@techcrunch"]},{"@type":"Person","@id":"https:\/\/techcrunch.com\/#\/schema\/person\/ae6736172fc69d49ba9b3d836e93d029","name":"Lorenzo Franceschi-Bicchierai","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techcrunch.com\/#\/schema\/person\/image\/e5c2a45b56c8d08b18a46cf3571af0fc","url":"https:\/\/secure.gravatar.com\/avatar\/675be9c00f9239b767b25cc470ba3878e035e319722e04170747562fd77e0d42?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/675be9c00f9239b767b25cc470ba3878e035e319722e04170747562fd77e0d42?s=96&d=identicon&r=g","caption":"Lorenzo Franceschi-Bicchierai"},"url":"https:\/\/techcrunch.com\/author\/lorenzo-franceschi-bicchierai\/"}]}},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks","url":"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/"},"thumbnailUrl":"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/03\/broken-iphone-screen-zoomed-in.jpg?w=150","image":{"@type":"ImageObject","url":"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/03\/broken-iphone-screen-zoomed-in.jpg"},"articleSection":"Security","author":[{"@type":"Person","name":"Lorenzo Franceschi-Bicchierai"}],"creator":["Lorenzo Franceschi-Bicchierai"],"publisher":{"@type":"Organization","name":"TechCrunch","logo":"https:\/\/techcrunch.com\/wp-content\/uploads\/2015\/02\/cropped-cropped-favicon-gradient.png"},"keywords":["apple","google","hackers","china","hacking","ios","lookout","russia","spyware","cybersecurity","zero-days","iverify","darksword","coruna"],"dateCreated":"2026-03-26T17:22:01Z","datePublished":"2026-03-26T17:22:01Z","dateModified":"2026-03-26T18:07:45Z"},"rendered":"<meta name=\"parsely-title\" content=\"Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/techcrunch.com\/2026\/03\/26\/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/03\/broken-iphone-screen-zoomed-in.jpg?w=150\" \/>\n<meta name=\"parsely-pub-date\" content=\"2026-03-26T17:22:01Z\" \/>\n<meta name=\"parsely-section\" content=\"Security\" \/>\n<meta name=\"parsely-tags\" content=\"apple,google,hackers,china,hacking,ios,lookout,russia,spyware,cybersecurity,zero-days,iverify,darksword,coruna\" \/>\n<meta name=\"parsely-author\" content=\"Lorenzo Franceschi-Bicchierai\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/techcrunch.com\/p.js"},"jetpack_featured_media_url":"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/03\/broken-iphone-screen-zoomed-in.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/posts\/3106277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/users\/133574594"}],"replies":[{"embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/comments?post=3106277"}],"version-history":[{"count":13,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/posts\/3106277\/revisions"}],"predecessor-version":[{"id":3106620,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/posts\/3106277\/revisions\/3106620"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/media\/3106547"}],"wp:attachment":[{"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/media?parent=3106277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/categories?post=3106277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/tags?post=3106277"},{"taxonomy":"tc_region","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/tc_region?post=3106277"},{"taxonomy":"tc_event","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/tc_event?post=3106277"},{"taxonomy":"tc_storyline_tax","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/tc_storyline_tax?post=3106277"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/coauthors?post=3106277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}