Google’s Risk Intelligence Group (GTIG) is warning {that a} “new and highly effective” iOS exploit equipment, dubbed Coruna by its builders has been deployed on pretend finance and crypto web sites designed to lure iPhone customers into visiting pages that may silently ship exploits. For crypto holders, the danger is blunt: GTIG’s evaluation shows the campaigns finally targeted on harvesting seed phrases and pockets information from well-liked cell apps.
Coruna targets Apple gadgets operating iOS 13.0 by way of iOS 17.2.1, bundling 5 full exploit chains and 23 exploits. GTIG says it recovered the equipment after monitoring its evolution throughout 2025, from early use by a buyer of a industrial surveillance firm, to “watering gap” assaults on compromised Ukrainian web sites, and at last to broad-scale distribution through Chinese language-language scam sites tied to a financially motivated actor it tracks as UNC6691.
A Crypto Lure Designed For iPhones
Within the scam-wave part, GTIG says it noticed the JavaScript framework behind Coruna deployed throughout a “very massive set” of faux Chinese language web sites largely themed round finance. One instance cited by GTIG is a pretend WEEX-branded crypto change web page that attempted to push guests onto an iOS machine—after which a hidden iFrame could be injected to ship the exploit equipment “no matter their geolocation.”
Associated Studying
The supply mechanics matter as a result of they blur the road between conventional phishing and outright machine compromise: in GTIG’s telling, merely arriving on the booby-trapped web page from a weak iPhone was sufficient to start the chain. The framework fingerprints the machine to determine mannequin and iOS model, then masses the suitable WebKit distant code execution exploit and a pointer authentication (PAC) bypass.
GTIG tied one WebKit RCE it recovered to CVE-2024-23222, noting it was addressed by Apple in iOS 17.3 on Jan. 22, 2024.
On the finish of the chain, GTIG says Coruna drops a stager it calls PlasmaLoader (tracked as PLASMAGRID) and describes it as targeted much less on basic surveillance options and extra on stealing monetary data. In response to GTIG, the payload can decode QR codes from photos saved on the machine and scan textual content blobs for BIP39 phrase sequences, together with key phrases similar to “backup phrase” and “checking account”, together with in Apple Memos, which it might probably then exfiltrate.
Associated Studying
The payload can be modular. GTIG says it might probably pull down and run further modules remotely, and that lots of the recognized modules are designed to hook capabilities and exfiltrate delicate data from widespread crypto pockets apps—amongst them MetaMask, Belief Pockets, Uniswap’s pockets, Phantom, Exodus, and TON ecosystem wallets similar to Tonkeeper.
The broader arc was additionally flagged by cell safety agency iVerify, which revealed its personal findings across the similar time as GTIG’s report. “And that’s precisely what occurred once more right here, however on cell gadgets. Cellphone OEMs do pretty much as good a job as anybody can do…”
What Crypto Customers Can Do Now
Google says Coruna “is just not efficient towards the newest model of iOS,” and urges customers to replace. If updating isn’t attainable, GTIG recommends enabling Apple’s Lockdown Mode. GTIG additionally says it added the recognized web sites and domains to Google Protected Looking to assist scale back additional publicity.
For crypto-native customers, the instant takeaway is sensible: cell wallets sit on the intersection of high-value belongings and high-frequency net visitors, which makes “visit-to-compromise” campaigns uniquely harmful. GTIG’s reporting suggests the rip-off funnel wasn’t nearly getting victims to attach wallets, it was about getting them onto the proper machine, on the proper iOS model, so exploitation might do the remaining.
At press time, the overall crypto market cap stood at $2.45 trillion.
Featured picture created with DALL.E, chart from TradingView.com
