Stock Markets March 18, 2026

Researchers Find Widespread iPhone Spyware Planted on Ukrainian Websites

Malware named Darksword found on dozens of sites can steal data from devices running iOS 18.4 to 18.6.2; researchers warn a flourishing market for sophisticated iOS exploits

By Caleb Monroe AAPL
Researchers Find Widespread iPhone Spyware Planted on Ukrainian Websites
AAPL

Security researchers disclosed a powerful iPhone exploit, dubbed Darksword, that was embedded on multiple Ukrainian websites and can extract information from devices running iOS 18.4 through 18.6.2. The discovery follows another high-profile iPhone spyware finding earlier in March and highlights an active market for tools that steal data and cryptocurrency wallet information. Apple has issued patches for the vulnerabilities, but researchers estimate many iPhones remain unpatched and therefore exposed.

Key Points

  • Researchers discovered Darksword spyware on dozens of Ukrainian websites capable of compromising iPhones running iOS 18.4 to 18.6.2.
  • Apple has issued fixes for vulnerabilities exploited by Darksword, but researchers estimate 220 million to 270 million iPhones may still run exposed iOS versions due to delayed updates.
  • The finding follows an earlier March disclosure of another powerful iPhone spyware, Coruna, and researchers say both tools indicate a growing market for sophisticated malware with financial motives.

On March 18 researchers reported the discovery of a capable iPhone exploit that had been placed on dozens of websites in Ukraine in recent weeks. The malware, which those researchers have named "Darksword," can infiltrate Apple iPhones and siphon information, according to coordinated analyses published by multiple security teams.

Teams from the cyber firm Lookout, mobile security company iVerify and Alphabet's Google shared technical findings on the tool, saying it represents a powerful data-theft capability. The announcement follows a separate disclosure earlier in March of another potent iPhone spyware known as "Coruna." Researchers noted that both tools are part of a larger set of exploits now appearing beyond previously narrow, state-level usage.

According to iVerify and Lookout, Darksword was delivered to visitors of dozens of Ukrainian websites if those visitors were using iPhones running iOS versions 18.4 through 18.6.2. Those iOS releases were issued by Apple between March and August 2025, the researchers said.

The teams said it is unknown precisely how many iPhones remain vulnerable to Darksword. Apple has released multiple security fixes that address the bugs exploited by the attackers, but researchers noted that many users do not install updates promptly. Based on public estimates of device software distribution, iVerify and Lookout put the number of iPhones still running exposed iOS versions at roughly 220 million to 270 million.

Researchers also highlighted operational details of how these tools are being used. They reported that Darksword was hosted on the same servers where suspected operators of the earlier Coruna spyware had placed components, and they suggested the current deployment behavior differs from that seen in state-linked operations.

"There’s now a verified pipeline of recent exploits … that have ended up in the hands of potentially criminal entities with a financial focus," said Justin Albrecht, principal researcher with Lookout.

Rocky Cole, co-founder and COO of iVerify, said the pattern of use suggests a shift in who is deploying these capabilities. Cole noted that the vulnerabilities came to light due to what researchers described as sloppy operational security, a trait not commonly associated with state-sponsored iPhone hacking.

"The fact that they don’t care if it gets burned, and that they’re using them in mass attacks with poor (operational security), that says a lot about how much they value these tools," Cole said. "They’re not overly precious about them being exposed."

The researchers emphasized that finding two separate, powerful iOS exploits within the same month points to a robust ecosystem for sophisticated malware that can harvest sensitive data and cryptocurrency wallet information. They said the tools appear to be circulating among entities with financial motives.

Google did not share its findings prior to the coordinated release. Apple did not provide a response to inquiries about the incidents, the researchers said.


Implications for consumers and markets

For consumers, the discovery underscores a persistent risk for users who delay installing software updates. For companies in the mobile security and consumer device sectors, a rising market for sophisticated offensive tools could influence demand for protections and heighten scrutiny on device update practices. The broad potential reach of the exploit - encompassing iPhones running several recent iOS versions - raises questions about the scale of exposure for large user populations.

Risks

  • Uncertainty about the exact number of vulnerable devices - researchers estimate 220 million to 270 million iPhones may still run exposed iOS versions, creating broad potential consumer impact - impacts smartphone users and consumer device markets.
  • Attackers exploiting these bugs have used poor operational security and mass-deployment tactics, increasing the chance exploits become widely known and repurposed - impacts cybersecurity vendors and financial sectors handling crypto wallets.
  • Apple has released patches, but many users do not promptly install updates, maintaining a window of exposure for data theft and fraud - impacts consumer trust and demand for mobile security solutions.

More from Stock Markets

Private-credit strain trims shares of Block and Affirm amid heavy redemptions at interval fund Mar 18, 2026 BMG Takes Anthropic to Court Over Use of Song Lyrics in AI Training Mar 18, 2026 Moroccan Equities Climb at Close; All Shares Index Advances 2.62% Mar 18, 2026 Tel Aviv Stocks Close Higher as Oil & Gas, Real Estate and Banks Lead Gains Mar 18, 2026 Oslo shares close higher as OBX hits fresh record, led by healthcare and utilities gains Mar 18, 2026