Categorie: News

The Russian government spies on iPhones using a tool created for the USA

Over the course of 2025, a vast and complex cyber espionage campaign has affected numerous owners of iPhone in Ukraine and China.

What makes this incident particularly serious is not only the scale of the attacks, but the origin itself of the tools used to penetrate the devices.

According to recent investigations conducted by Google’s security teams and corroborated by independent researchers, the architecture used, known by the code name “Coruna”, had originally been designed for Western intelligence agencies.

This sophisticated software package has progressively ended up in the hands of Russian government agents and, subsequently, Chinese cybercriminals.

US tool for spying on iPhones ends up in the hands of Russian and Chinese governments

Credits: Gemini

The compromise kit comprises 23 distinct components, originally designed for highly sophisticated operations.

Technical analyses, combined with revelations from anonymous former employees, decisively point toward L3Harris, a well-known US defense contractor, and specifically toward its division Trenchant.

This company develops and provides infiltration technologies exclusively to the US government and to Five Eyes partners.

How did such delicate software get through the tightest geopolitical barriers? The answer lies in the illicit actions of a single individual.

Between 2022 and mid-2025, a former executive of the Trenchant division stole and sold 8 proprietary tools to Operation Zero, a Russian company specialized in purchasing zero-day vulnerabilities.

In exchange for about 1.3 million dollars, these strategic assets were ceded to an entity operating in direct contact with Moscow’s institutions, exposing systems around the world.

The United States government has confirmed that the Russian intermediary later shared or resold this code to unauthorized third parties, triggering a chain reaction. This handover allowed the Kremlin-affiliated espionage group, identified by Google as UNC6353, to come into possession of Coruna.

From targeted espionage to large-scale crime

Once the arsenal was acquired, the Russian agents implemented it to compromise specific Ukrainian websites. The attack was extremely surgical: the software infected the devices of Apple users located in certain geographic areas who, unaware of it, visited manipulated portals.

However, the spread of the code did not stop within the military and governmental sphere.

The kit inexorably slipped toward the digital black market, landing on Chinese hackers’ servers. They have altered the weapon’s nature, turning a surveillance tool into a means to conduct massive financial fraud, stealing traditional currency and cryptocurrencies from thousands of victims.

This highlights how evidently difficult it is to contain the spread of cyber weapons once stolen from their original creators.

The clues and the precedents

Analysts have identified clear and unequivocal links between Coruna and another infamous cyber offensive discovered by Kaspersky in 2023, dubbed Operation Triangulation.

Both campaigns exploit identical vulnerabilities, internally named Photon and Gallium, sharing also entirely overlapping structural modules.

Evidence of a US-origin matrix also emerges from seemingly marginal details, such as the habit of L3Harris to assign bird names to its software: several Coruna components bear names such as Cassowary and Sparrow.

Although there have never been formal accusations by cybersecurity companies, the sector has its ways of communicating its discoveries.

The same Kaspersky, when publishing the details of Operation Triangulation, had designed and circulated a logo for the campaign that closely mirrored the L3Harris brand, subtly suggesting the technology’s provenance without having to declare it openly.

Luca Zaninello

Appassionato del mondo della telefonia da sempre, da oltre un decennio si occupa di provare con mano i prodotti e di raccontare le sue esperienze al pubblico del web. Fotografo amatoriale, ha un occhio di riguardo per i cameraphone più esagerati.

Recent Posts

Google aims to go head-to-head with WHOOP, Stephen Curry previews the new Fitbit

Google is preparing to introduce a brand-new device for its wearables lineup, entering direct competition…

20 hours ago

vivo X300 Ultra: less battery in Europe, but you won’t be disappointed

Recently Vivo announced its new Camera Phone for the Chinese market, with a major novelty…

21 hours ago

Will Google block Android downgrades with the next Pixel 10 update?

Google seems intent on tightening protection measures related to software on its newer smartphones. According…

22 hours ago

Review Realme Buds Air8: the new benchmark at 50 euros

The market for TWS headphones is now saturated, with fierce competition among brands to offer…

22 hours ago

Nothing beyond the boundaries of smartphones: it will target AI glasses

The company founded by Carl Pei aims to expand its product ecosystem well beyond smartphones.…

22 hours ago

Pixel 11 Pro in render images: the winning design doesn’t change (but can be improved)

A few days after the renders dedicated to the standard model, we are back to…

22 hours ago