This new DarkSword iOS exploit can steal almost everything from your iPhone – here's what we know
At least six flaws are being chained to target iPhone users
· TechRadarNews By Sead Fadilpašić published 19 March 2026
Share this article 0 Join the conversation Follow us Add us as a preferred source on Google Newsletter
Get the TechRadar Newsletter
Sign up for breaking news, reviews, opinion, top tech deals, and more.
Contact me with news and offers from other Future brands Receive email from us on behalf of our trusted partners or sponsors
By submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.
You are now subscribed
Your newsletter sign-up was successful
An account already exists for this email address, please log in. Subscribe to our newsletter
- Researchers uncover DarkSword malware framework targeting iPhones
- Exploits six high-severity flaws in iOS 18.4–18.7, now patched
- Used by spyware vendors and state-backed groups with variants like GhostSaber and GhostKnife
Security researchers uncovered a new malware framework called DarkSword, capable of stealing plenty of sensitive data from iPhone users.
Earlier this week a number of security vendors, including Google, sounded the alarm on DarkSword, saying it leverages at least six vulnerabilities, and is being actively used by multiple commercial spyware makers, as well as state-sponsored hackers, in in-the-wild attacks.
Some of these flaws are zero-days, meaning they were being exploited before Apple, or anyone else in the cybersecurity community, knew about them. They affect iOS versions 18.4 to 18.7 and all were, since then, patched. So, make sure you’ve updated your iPhone to the latest version.
Article continues below
Commercial malware abuse
The vulnerabilities being abused are as follows:
- CVE-2025-31277 (8.8/10 - high)
- CVE-2025-43529 (8.8/10 - high)
- CVE-2026-20700 (7.8/10 - high)
- CVE-2025-14174 (8.8/10 - high)
- CVE-2025-43510 (7.8/10 - high)
- CVE-2025-43520 (7.1/10 - high)
Google, as well as other security outfits including Lookout and iVerify, are saying DarkSword is in active use since at least November 2025, by multiple commercial malware vendors, as well as state-sponsored groups. For example, Google says a Turkish company called PARS Defense was using it to target both Turkish and Malaysian victims.
The company also mentions UNC6353, allegedly a Russian state-sponsored actor, using DarkSword against Ukrainian targets. Finally, there is a group tracked as UNC6748 that has been using a Snapchat-themed website to target people in Saudi Arabia.
The framework itself doesn’t include malware, though. Each group has been using a different variant in their attacks, it was said, with PARS using GhostSaber to enumerate accounts, list files, exfiltrate data, and run JavaScript remotely.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Contact me with news and offers from other Future brandsReceive email from us on behalf of our trusted partners or sponsors