Home OSINT News Signals
CYBER

Apple Backports Critical WebKit Patch to Older Devices Amid Coruna Exploit Kit Activity

🕓 2 min read

Apple has taken the unusual step of issuing security updates for older, unsupported versions of its iOS and iPadOS operating systems. This action is a direct response to the active exploitation of a critical WebKit vulnerability, tracked as CVE-2023-43010, by a sophisticated exploit kit known as Coruna. The flaw, which could lead to memory corruption when processing malicious web content, was originally patched in iOS 17.2 in December 2023. Apple's latest updates now extend this crucial fix to legacy devices that cannot upgrade to the latest iOS versions, specifically bringing patches to iOS 15.8.7 and iPadOS 15.8.7. This move underscores the severity of the threat and Apple's commitment to protecting a broader user base from active attacks.

The Coruna exploit kit represents a significant and complex threat. According to recent analyses, including from Google's Threat Analysis Group, Coruna is a formidable framework comprising 23 individual exploits arranged across five distinct chains. It is specifically engineered to target a wide range of iPhone models running iOS versions 13.0 through 17.2.1. Further investigation by security firm iVerify, which tracks the kit under the name "CryptoWaters," suggests its code bears similarities to frameworks historically linked to threat actors affiliated with the U.S. government. This has fueled speculation about its origins and intended targets, highlighting its potential as a tool for high-stakes cyber espionage.

Intriguingly, the Coruna kit's development has been linked to a controversial nexus of private contractors and the exploit broker ecosystem. Reports indicate the kit was likely developed by U.S. military contractor L3Harris. The plot thickened with the revelation that a former L3Harris general manager, Peter Williams, was convicted and sentenced to over seven years in prison for selling exploits. It is alleged he may have passed Coruna to the Russian exploit brokerage firm, Operation Zero. This pipeline from a U.S. defense contractor to a foreign broker illustrates the murky, global market for potent cyber weapons and the challenges in controlling their proliferation.

The technical sophistication of Coruna is further evidenced by its inclusion of two previously weaponized zero-day exploits: CVE-2023-32434 and CVE-2023-38606. These were famously used in the "Operation Triangulation" campaign discovered by Kaspersky in 2023, which targeted users in Russia. The reuse of these high-value exploits within Coruna suggests the kit's authors have access to a powerful arsenal. As noted by Kaspersky, while the exploit chains are complex, they are not beyond the capability of a well-resourced and skilled team. For users, the imperative is clear: applying Apple's provided patches immediately is the only definitive defense against these evolving and deeply embedded threats.

Telegram X LinkedIn
Back to News