A sophisticated iPhone hacking toolkit, dubbed Coruna, is raising serious concerns about the proliferation of advanced cyberweapons. Recent investigations reveal the toolkit, capable of compromising Apple devices running older versions of iOS, may have originated with a U.S. Government contractor before falling into the hands of Russian intelligence, and Chinese cybercriminals. The discovery highlights the risks of vulnerabilities escaping controlled channels and being repurposed for malicious activities, including espionage and financial theft.
The saga began with the condemnation of Peter Williams, former director general of Trenchant, a U.S. Firm specializing in zero-day exploits, to seven years in prison. Williams was found guilty of stealing eight vulnerabilities and selling them for $1.3 million to Operation Zero, a Russian competitor, according to the Department of Justice. Nextgov reports that the Office of Foreign Assets Control (OFAC) confirmed Operation Zero subsequently sold these stolen tools to unauthorized users.
Google’s Threat Intelligence Group uncovered Coruna, identifying it as a particularly potent hacking toolkit leveraging 23 iOS vulnerabilities across five exploit chains. The toolkit’s complexity suggests a significant development cost, potentially reaching millions of dollars. Wired details how Coruna was initially observed in February 2025, linked to a “customer of a surveillance company,” then reappeared in a Russian espionage campaign targeting Ukraine, and finally surfaced in attacks on Chinese-language cryptocurrency and gambling sites.
Evidence increasingly points to a U.S. Origin for Coruna. Two former L3Harris employees, speaking to TechCrunch, indicated the toolkit was developed, at least in part, by Trenchant’s technology division. “Coruna was undoubtedly the internal name for a component,” one former employee stated, adding that technical details shared by Google were familiar. L3Harris reportedly sells its hacking and surveillance tools exclusively to the U.S. Government and its “Five Eyes” intelligence allies – Australia, Canada, New Zealand, and the United Kingdom.
From Espionage to Financial Gain
The journey of Coruna demonstrates a disturbing pattern of exploit proliferation. According to prosecutors, Williams admitted to writing the code he sold to Operation Zero, which was then used by a South Korean broker. TechCrunch suggests this may be the route through which Coruna ultimately reached Chinese hackers. The toolkit’s use evolved from targeted espionage – initially against Ukrainian targets – to financially motivated attacks aimed at stealing cryptocurrency.
Naming Conventions and Potential Connections
Security researcher Costin Raiu noted that Trenchant frequently uses bird names to designate its tools. Interestingly, several of the 23 exploits within Coruna also bear avian names, including Cassowary, Terrorbird, Bluebird, Jacurutu, and Sparrow. This naming convention further strengthens the link between Coruna and Trenchant’s development work. The discovery echoes concerns raised by the 2017 leak of the NSA’s EternalBlue exploit, which was subsequently weaponized in the WannaCry ransomware and NotPetya attacks.
Implications for Cybersecurity
The Coruna case underscores the inherent risks associated with the development and sale of zero-day exploits. While such tools may be necessary for legitimate intelligence gathering and national security purposes, their potential for misuse is significant. The incident also raises questions about the oversight and control of these technologies, and the necessitate for greater transparency in the zero-day market. The fact that a tool potentially built for U.S. Government use ended up facilitating cybercrime globally is a stark reminder of the challenges in securing the digital landscape.
Looking ahead, the cybersecurity community will likely focus on strengthening defenses against similar attacks and improving vulnerability disclosure practices. The incident with Coruna will undoubtedly fuel further debate about the regulation of the zero-day exploit market and the need for international cooperation to combat the proliferation of cyberweapons. Continued vigilance and proactive threat intelligence are crucial to mitigating the risks posed by these advanced hacking tools.
What are your thoughts on the potential for government-developed exploits to end up in the wrong hands? Share your comments below.