{"id":46,"date":"2026-04-01T10:28:22","date_gmt":"2026-04-01T10:28:22","guid":{"rendered":"https:\/\/insightinspiretime.com\/?p=46"},"modified":"2026-04-01T10:28:23","modified_gmt":"2026-04-01T10:28:23","slug":"a-suite-of-government-hacking-tools-targeting","status":"publish","type":"post","link":"https:\/\/insightinspiretime.com\/index.php\/2026\/04\/01\/a-suite-of-government-hacking-tools-targeting\/","title":{"rendered":"A suite of government hacking tools targeting iPhones is now being used by cybercriminals"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"680\" src=\"https:\/\/insightinspiretime.com\/wp-content\/uploads\/2026\/04\/apple-mac-iphone-security-1024x680.webp\" alt=\"\" class=\"wp-image-47\" srcset=\"https:\/\/insightinspiretime.com\/wp-content\/uploads\/2026\/04\/apple-mac-iphone-security-1024x680.webp 1024w, https:\/\/insightinspiretime.com\/wp-content\/uploads\/2026\/04\/apple-mac-iphone-security-300x199.webp 300w, https:\/\/insightinspiretime.com\/wp-content\/uploads\/2026\/04\/apple-mac-iphone-security-768x510.webp 768w, https:\/\/insightinspiretime.com\/wp-content\/uploads\/2026\/04\/apple-mac-iphone-security.webp 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p id=\"speakable-summary\">Security researchers have identified a suite of powerful hacking tools capable of compromising iPhones running older software that they say has passed from a government customer into the hands of cybercriminals.<\/p>\n\n\n\n<p>Google&nbsp;<a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/coruna-powerful-ios-exploit-kit\" target=\"_blank\" rel=\"noreferrer noopener\">said Tuesday<\/a>&nbsp;that it first identified the exploit kit, dubbed Coruna, in February 2025 during a&nbsp;<a href=\"https:\/\/techcrunch.com\/2025\/04\/25\/techcrunch-reference-guide-to-security-terminology\/#spyware-commercial-government\" target=\"_blank\" rel=\"noreferrer noopener\">surveillance vendor\u2019s attempt<\/a>&nbsp;to hack into someone\u2019s phone with spyware on behalf of a government customer. It found the same exploit kit months later targeting Ukrainian users in a broad-scale campaign by a Russian espionage group, and then later found it used by a financially motivated hacker in China.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers have identified a suite of powerful hacking tools capable of compromising iPhones running older software that they say has passed from a government customer into the hands of cybercriminals. Google&nbsp;said Tuesday&nbsp;that it first identified the exploit kit, dubbed Coruna, in February 2025 during a&nbsp;surveillance vendor\u2019s attempt&nbsp;to hack into someone\u2019s phone with spyware on &#8230; <a title=\"A suite of government hacking tools targeting iPhones is now being used by cybercriminals\" class=\"read-more\" href=\"https:\/\/insightinspiretime.com\/index.php\/2026\/04\/01\/a-suite-of-government-hacking-tools-targeting\/\" aria-label=\"Read more about A suite of government hacking tools targeting iPhones is now being used by cybercriminals\">Read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[15],"class_list":["post-46","post","type-post","status-publish","format-standard","hentry","category-hacking","tag-a-suite-of-government-hacking-tools-targeting"],"_links":{"self":[{"href":"https:\/\/insightinspiretime.com\/index.php\/wp-json\/wp\/v2\/posts\/46","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/insightinspiretime.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/insightinspiretime.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/insightinspiretime.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/insightinspiretime.com\/index.php\/wp-json\/wp\/v2\/comments?post=46"}],"version-history":[{"count":1,"href":"https:\/\/insightinspiretime.com\/index.php\/wp-json\/wp\/v2\/posts\/46\/revisions"}],"predecessor-version":[{"id":48,"href":"https:\/\/insightinspiretime.com\/index.php\/wp-json\/wp\/v2\/posts\/46\/revisions\/48"}],"wp:attachment":[{"href":"https:\/\/insightinspiretime.com\/index.php\/wp-json\/wp\/v2\/media?parent=46"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insightinspiretime.com\/index.php\/wp-json\/wp\/v2\/categories?post=46"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insightinspiretime.com\/index.php\/wp-json\/wp\/v2\/tags?post=46"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}