The Corona bundle: The vulnerability monster that trembles before the iPhone's "lock mode"

Have you ever imagined a magic toolkit containing a key for every lock in your house? That's exactly what the "Coruna" malware package, uncovered by Google's Threat Analysis Group (GTIG), represents. We're not talking about a single, isolated security vulnerability, but a veritable "supermarket" of security exploits that has passed through the hands of Russian spyware vendors and intelligence agencies, all the way to Chinese scammers, in a suspicious journey that reveals how the "used vulnerabilities" market operates in the dark web.

Apple lock and security protection


Corona's journey from international espionage to financial theft

The Coruna suite is considered one of the most comprehensive iPhone hacking tools ever publicly documented. Its story began in February 2025 when it was first spotted in the hands of customers of a commercial company specializing in surveillance software. However, like any lethal weapon, it didn't remain in the hands of a single entity; by the summer of 2025, the same tools had appeared in attacks launched by a Russian spy group targeting users in Ukraine through suspicious websites.

Ironically (and alarmingly), what happened later in late 2025 was that these sophisticated technologies fell into the hands of Chinese criminals motivated purely by financial gain. They used them to plant traps on fake cryptocurrency and banking websites. This transfer proves that the malware market is incredibly active, and that vulnerabilities once reserved for states are now available to anyone who can pay, much like buying an old phone from a secondhand market, but with very malicious intent.


Technological intelligence in the service of sabotage

This package isn't just random code; it's highly sophisticated software engineering. When an unlucky user visits a compromised website, the package immediately analyzes their iPhone, identifies its model and operating system version, and then selects…The right bullet“Among the 23 security vulnerabilities stored in its arsenal, to execute the attack with extreme precision.”

This malware targets iOS versions 13.0 through 17.2.1. The attack code is heavily encrypted and wrapped in a custom format created by the developers to complicate the task for security researchers. The developers even included detailed English notes within the code explaining how each part works, indicating a high level of (and malicious) expertise in creating this malware.

This demonstrates how important it is to upgrade your device's operating system to the latest version.


Hackers have their eyes on your wallet (and notes too!)

The ultimate goal of Coruna isn't just spying, but accessing money. The software is designed to link to 18 different cryptocurrency apps to steal credentials. Furthermore, it can decode QR codes from images stored on the device and scan text for seed phrases or keywords like "bank account" or "backup."

From iPhoneIslam.com, a close-up of a smartphone screen showing app icons for Notes, Photos, and part of another app on a black background — perfect for following tech news or a weekly Apple news roundup.

What should really alarm you is its ability to scan your Apple Notes app for any sensitive data you might have left there, thinking it was safe. So, if you're still keeping your passwords in Notes, it's time to break this bad habit immediately.


Closure pattern: The hero who didn't wear a cloak

Amidst all this alarming news, one hero has managed to stand out. A Google report confirmed an astonishing fact: once the hacking code detects that the user has activated [the feature/service], “Lockdown Mode” On the iPhone, it pulls back immediately! The package doesn't even attempt to attack, because the strict security restrictions imposed by this pattern make hacking attempts futile and technically costly.

This is a major success for Apple; the lockout mode, which some might find complex or restrictive, has proven to be an impenetrable fortress against 23 sophisticated vulnerabilities. If you feel you are a target or work in a sensitive area, don't hesitate to activate this mode; it literally makes hackers pack their bags and leave.

Is this report enough to scare you into making regular system updates?

Source:

macrumors.com

6 comment

comments user
Walid

Dear Blog Administrator: The article written by the AI ​​didn't explicitly state that; it said that the affected systems are from 13 to 17. I asked for confirmation, and he gave a nonsensical answer. That's the first point. The second point is why were most of the comments and replies deleted? I think that's unprofessional.

    comments user
    Blog administrator

    We're experimenting these days, as you can see, and some strange mistakes may occur, so please forgive us.

comments user
Dhaifullah

Thank God, the system is updated every time it's released.

    comments user
    AI Smart

    This is absolutely the right thing to do. Updates aren't just about new features; they're your first line of defense against those who would steal our data. Keep it up, and you'll make it impossible for any vulnerability seeker to exploit it.

comments user
Walid

Dear writer:
Does this package work with system 26?

    comments user
    Blog administrator

    No, we mentioned in the article that it doesn't work on it.

Leave a response