Coruna: the framework used in Operation Triangulation

Securelist
Actively Exploited

Overview

Kaspersky's GReAT team has identified a new exploit kit called Coruna, which specifically targets iPhones. This kit utilizes kernel exploits associated with two vulnerabilities, CVE-2023-32434 and CVE-2023-38606, and is an updated version of techniques used in Operation Triangulation. The existence of these exploits poses significant risks to iPhone users, as they could potentially allow attackers to gain unauthorized access to sensitive data or control over the devices. Users should be aware of these vulnerabilities and take steps to secure their devices against exploitation. The findings emphasize the need for continuous vigilance in mobile security as attackers evolve their methods.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: iPhones affected by CVE-2023-32434 and CVE-2023-38606
  • Action Required: Users should ensure their iPhones are updated to the latest software version to mitigate the risks associated with these vulnerabilities.
  • Timeline: Newly disclosed

Original Article Summary

Kaspersky GReAT experts look into the Coruna exploit kit targeting iPhones. We discovered that the kernel exploit for CVE-2023-32434 and CVE-2023-38606 is an updated version of the Operation Triangulation exploit.

Impact

iPhones affected by CVE-2023-32434 and CVE-2023-38606

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Newly disclosed

Remediation

Users should ensure their iPhones are updated to the latest software version to mitigate the risks associated with these vulnerabilities. Regularly applying updates helps protect against known exploits.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to CVE, Apple, Exploit, and 2 more.

Related Coverage

Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security

The Hacker News

Google has updated its Quick Share service to enable compatibility with Apple's AirDrop, facilitating easier file sharing between Android and iPhone devices. This feature is currently available for the Pixel 10 lineup and is expected to expand to other devices in the future.

Nov 21, 2025

New FlexibleFerret Malware Chain Targets macOS With Go Backdoor

Infosecurity Magazine

The article discusses a new macOS malware chain attributed to FlexibleFerret, which employs staged scripts and a Go-based backdoor to steal user credentials and maintain persistent access to infected systems. This represents a significant cybersecurity threat to macOS users, emphasizing the need for heightened security measures against such sophisticated attacks.

Nov 25, 2025

DPRK's FlexibleFerret Tightens macOS Grip

darkreading

The DPRK's FlexibleFerret campaign is evolving its tactics to enhance its social engineering scams aimed at macOS users, indicating a sophisticated approach to credential theft. This ongoing threat underscores the need for heightened awareness and security measures among macOS users to protect against such attacks.

Nov 25, 2025

​​Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications​

All CISA Advisories

CISA has identified that various cyber threat actors are using commercial spyware to target users of mobile messaging applications, employing tactics such as phishing, zero-click exploits, and impersonation. The focus is primarily on high-value individuals including government and military officials, indicating a serious threat to sensitive communications.

Nov 24, 2025

IT threat evolution in Q3 2025. Non-mobile statistics

Securelist

The report highlights the evolving landscape of IT threats in Q3 2025, focusing on malware targeting Windows and macOS personal computers, as well as IoT devices. This indicates a growing severity of cyber threats that could have significant implications for users and organizations relying on these systems.

Nov 19, 2025

India Rolls Back App Mandate Amid Surveillance Concerns

darkreading

India has decided to roll back its mandate requiring citizens to install a cybersecurity app designed to enhance surveillance and security. The app, intended to monitor digital activities, faced backlash over privacy concerns, with citizens worried about excessive government monitoring and data collection. The government's initial push for this app was met with skepticism, drawing comparisons to Apple's controversial decision to distribute a U2 album to all iTunes users. By reversing this mandate, India acknowledges the public's apprehension regarding personal privacy and the implications of government surveillance. This situation underscores the delicate balance between national security and individual privacy rights, a conversation that continues to evolve in the digital age.

Dec 5, 2025