3/18/2026 at 2:51:16 PM
Here is the Google Research group's writeuphttps://cloud.google.com/blog/topics/threat-intelligence/dar...
Relevant forward:
> GTIG has identified several different users of the DarkSword exploit chain dating back to November 2025. In addition to the case studies on DarkSword usage documented in this blog post, we assess it is likely that other commercial surveillance vendors or threat actors may also be using DarkSword.
> Google Threat Intelligence Group (GTIG) has identified a new iOS full-chain exploit that leveraged multiple zero-day vulnerabilities to fully compromise devices. Based on toolmarks in recovered payloads, we believe the exploit chain to be called DarkSword. Since at least November 2025, GTIG has observed multiple commercial surveillance vendors and suspected state-sponsored actors utilizing DarkSword in distinct campaigns. These threat actors have deployed the exploit chain against targets in Saudi Arabia, Turkey, Malaysia, and Ukraine.
> DarkSword supports iOS versions 18.4 through 18.7 and utilizes six different vulnerabilities to deploy final-stage payloads. GTIG has identified three distinct malware families deployed following a successful DarkSword compromise: GHOSTBLADE, GHOSTKNIFE, and GHOSTSABER. The proliferation of this single exploit chain across disparate threat actors mirrors the previously discovered Coruna iOS exploit kit. Notably, UNC6353, a suspected Russian espionage group previously observed using Coruna, has recently incorporated DarkSword into their watering hole campaigns.
by jryio
3/18/2026 at 3:00:26 PM
This should be the post, not Wired's blogspam.by alecco
3/18/2026 at 4:08:55 PM
I wonder if that means 18.7.4 is vulnerable for all the Liquid Glass haters?by echelon_musk
3/18/2026 at 4:52:09 PM
It's vulnerable, but iOS 18 since iOS 18.7.3 is only available for the 2018 iPhone XS and XR.by lynndotpy
3/19/2026 at 2:37:33 AM
Also of note, the exploit relied on: - CVE-2025-31277 or CVE-2025-43529
- CVE-2026-20700
- CVE-2025-14714
- CVE-2025-43510
- CVE-2025-43520
Any single of these patched and the exploit was not functional anymore. After a collaboration between the Google Threat Intelligence Group and Apple all of these have been patched.
by TacticalCoder
3/18/2026 at 3:38:28 PM
I know everyone hates liquid glass but isn’t that better security wise than being on an iOS that’s 8 versions behind?by bix6
3/18/2026 at 3:40:05 PM
There are not 8 major versions between iOS 18 and iOS 26. Apple skipped the monotonously increasing version numbering system since iOS 1 during WDDC 2025 to adopt a year suffix based versioning system.iOS 17, then iOS 18, then iOS 26, then iOS 27.
You're not the only party confused.
by jryio
3/18/2026 at 3:53:43 PM
Haha thanks! Good to know they are on years now. Back to random version numbers in 5 year? :pby bix6
3/18/2026 at 6:33:51 PM
How is increasing by 1 every year random? :Pby sunnybeetroot
3/19/2026 at 6:02:50 AM
At some point they will decide to release two versions in a single year and have figure out how to distinguish them.It's inevitable because they decided on year, and Murphy's law dictates that'll they will encounter this problem.
by happymellon
3/18/2026 at 3:56:49 PM
Semver has always been kingby reactordev
3/18/2026 at 6:11:20 PM
Edit: Oop, I misread! Right, yes, the change up was arguably not entirely boring. Some people were excited at least.Originally: To be the annoying pedant, version numbers did still monotonically increase, even with the gap, because each version is >= to the last. The mono means a single direction, not a step size of one.
by skygazer
3/18/2026 at 6:19:33 PM
to be an even more annoying pedant. they technically said "monotonously" not monotonically, though skipping to 26 still seems pretty monotonous.by ticulatedspline