Summarize with:

Share
Google Threat Intelligence Group says DarkSword is a full-chain iOS exploit that used six vulnerabilities to fully compromise iPhones running iOS 18.4 through 18.7. The more important story is not just the exploit chain itself. It is the way DarkSword spread across different operators: UNC6748 in Saudi Arabia, PARS Defense activity in Turkey and Malaysia, and UNC6353, a suspected Russian espionage actor, in watering-hole attacks against Ukrainian users.
That is the part defenders should focus on. A premium mobile zero-day capability did not stay exclusive. It moved across commercial surveillance operations and state-linked espionage, with different payloads, different operational tradecraft, and the same core exploitation path underneath.
According to Google, DarkSword has been active since at least November 2025. Across the observed campaigns, the chain delivered three different JavaScript malware families after compromise:
The campaigns were geographically distinct, but technically related:
snapshare[.]chat, to deliver DarkSword.static.cdncounter[.]net.Google reported the vulnerabilities to Apple in late 2025. GTIG says all of the vulnerabilities used by DarkSword were patched by iOS 26.3, although most of them were fixed earlier in the iOS 18.7.x and 26.x branches.
This is not just another mobile bug report. It is evidence that advanced iPhone exploitation keeps moving between vendors, customers, and state-linked operators. That kind of capability reuse compresses the gap between boutique spyware activity and mainstream high-end intrusion operations.
DarkSword was not tied to one implant. Google found the same exploitation framework leading to different post-exploitation outcomes:
That flexibility matters because defenders cannot assume one exploit chain maps neatly to one malware family or one actor profile.
UNC6353’s use of DarkSword against Ukrainian targets is the clearest reminder here. High-end iPhone exploitation is part of real-world espionage tradecraft, not just a premium surveillance market curiosity. Security teams that still treat mobile compromise as edge-case risk are behind the curve.
Google says DarkSword used six vulnerabilities to move from Safari-based remote code execution to full kernel privileges.
DarkSword used different JavaScriptCore bugs depending on the iOS version:
Both were chained with CVE-2026-20700, a dyld Pointer Authentication Code bypass that helped the attackers execute arbitrary code and continue the chain.
After initial execution, DarkSword escaped Safari’s sandbox in two steps:
mediaplaybackd, a more privileged system service.The final step used CVE-2025-43520, a kernel race condition in XNU’s VFS layer, to gain full kernel privileges and deploy the final payload.
The delivery side was not identical across operators, but Google says the overlap is strong enough to suggest a shared developer base behind DarkSword.
Common themes included:
uid session storage key to manage infection logicThere were also clear operator-level differences:
x-safari-https handler.snapshare[.]chat, sahibndn[.]io, e5.malaymoil[.]com, and static.cdncounter[.]netSecurity teams should fold mobile exploit-chain monitoring into normal threat intelligence work. DarkSword is another reminder that sophisticated mobile intrusion capability can spread faster than many defenders still assume.
DarkSword matters because it shows the industrialization of iPhone exploitation. One exploit chain. Multiple operators. Multiple countries. Multiple payloads. Same basic lesson: if a high-end mobile capability exists in the surveillance ecosystem, defenders should expect it to leak, spread, or be repurposed.
That shifts the defender conversation. The question is no longer whether advanced iOS exploitation can proliferate. It already has. The real question is whether organizations are treating mobile compromise with the urgency they already apply to desktop command-and-control, credential theft, and endpoint intrusion.
DarkSword is a full-chain iOS exploit framework identified by Google that used six vulnerabilities to compromise iPhones and deploy JavaScript payloads with full kernel privileges.
Google says DarkSword supported iOS 18.4 through 18.7. In the campaigns Google observed, UNC6353 activity only supported iOS 18.4 through 18.6, while earlier campaigns also handled iOS 18.7.
Google linked DarkSword to UNC6748, PARS Defense customers, and UNC6353, a suspected Russian espionage actor.
Google identified GHOSTKNIFE, GHOSTSABER, and GHOSTBLADE as the final-stage malware families delivered after successful exploitation.
Patch Apple devices quickly, enable Lockdown Mode for high-risk users when needed, monitor for the listed delivery infrastructure, and escalate suspicious iPhone activity into proper mobile investigation workflows.
Written by
Research
A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether I’m building tools, tracking threat actors, or experimenting with AI workflows, I’m always exploring new ways to stay one step ahead in today’s fast-moving digital landscape.
Get the latest cybersecurity insights in your inbox.
Threat Hunting & IntelDarkSword iOS Exploit Chain Hits Multiple Threat Actors Executive Summary Google Threat Intelligence Group says DarkSword is a full-chain iOS [exploit](https://...
Threat Hunting & IntelRondoDox botnet shifts to focused exploitation across 174 flaws The RondoDox botnet is no longer just another noisy vulnerability spray-and-pray operation. New...
Threat Hunting & IntelSlopoly Shows How AI-Generated Malware Is Entering Ransomware Operations | 2026 Executive Summary IBM X-Force says a ransomware-linked intrusion involved a like...