Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Your browser’s payment autofill can be hacked. Use these 3 alternatives instead

    Gigabyte MO27Q28G review: A great entry-level OLED monitor

    Ditch recurring fees and own Office 2021 Professional for under $40

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      What the polls say about how Americans are using AI

      February 27, 2026

      Tensions between the Pentagon and AI giant Anthropic reach a boiling point

      February 21, 2026

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026
    • Business

      Salesforce tracks possible ShinyHunters campaign targeting its users

      March 15, 2026

      The team behind continuous batching says your idle GPUs should be running inference, not sitting dark

      March 13, 2026

      Met Office ‘supercomputing as a service’ one year old

      March 12, 2026

      Tech hiring evolves as candidates ask for AI compute alongside pay and perks

      March 11, 2026

      Oracle is spending billions on AI data centers as cash flow turns negative

      March 11, 2026
    • Crypto

      Banks Respond to Kraken’s Federal Reserve Access as Trump Sides with Crypto

      March 4, 2026

      Hyperliquid and DEXs Break the Top 10 — Is the CEX Era Ending?

      March 4, 2026

      Consensus Hong Kong 2026: The Institutional Turn 

      March 4, 2026

      New Crypto Mutuum Finance (MUTM) Reports V1 Protocol Progress as Roadmap Enters Phase 3

      March 4, 2026

      Bitcoin Short Sellers Caught Off Guard in New White House Move

      March 4, 2026
    • Technology

      Your browser’s payment autofill can be hacked. Use these 3 alternatives instead

      March 16, 2026

      Gigabyte MO27Q28G review: A great entry-level OLED monitor

      March 16, 2026

      Ditch recurring fees and own Office 2021 Professional for under $40

      March 16, 2026

      Shopify says purchases are coming ‘inside ChatGPT’ through agentic storefronts as OpenAI retreats on Instant Checkout

      March 16, 2026

      Lay’s uses WhatsApp to create a group chat for World Cup fans

      March 16, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor
    Technology

    An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor

    TechAiVerseBy TechAiVerseMarch 10, 2026No Comments8 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor

    A mass hacking campaign targeting iPhone users in Ukraine and China used tools that were likely designed by U.S. military contractor L3Harris, TechCrunch has learned. The tools, which were intended for Western spies, wound up in the hands of various hacking groups, including Russian government spooks and Chinese cybercriminals.

    Last week, Google revealed that over the course of 2025 it discovered that a sophisticated iPhone-hacking toolkit had been used in a series of global attacks. The toolkit, dubbed “Coruna” by its original developer, was made of 23 different components first used “in highly targeted operations” by an unnamed government customer of an unspecified “surveillance vendor.” It was then used by Russian government spies against a limited number of Ukrainians and finally by Chinese cybercriminals “in broad-scale” campaigns with the goal of stealing money and cryptocurrency. 

    Researchers at mobile cybersecurity company iVerify, which independently analyzed Coruna, said they believed it may have been originally built by a company that sold it to the U.S. government.

    Two former employees of government contractor L3Harris told TechCrunch that Coruna was, at least in part, developed by the company’s hacking and surveillance tech division, Trenchant. The two former employees both had knowledge of the company’s iPhone hacking tools. Both spoke on condition of anonymity because they weren’t authorized to talk about their work for the company.

    “Coruna was definitely an internal name of a component,” said one former L3Harris employee, who was familiar with iPhone hacking tools as part of their work at Trenchant. 

    “Looking at the technical details,” this person said, referring to some of the evidence Google published, “so many are familiar.” 

    Contact Us

    Do you have more information about Coruna, or other government hacking and spyware tools? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or by email.

    The former employee said the overarching Trenchant toolkit housed several different components, including Coruna and related exploits. Another former employee confirmed that some of the details included in the published hacking toolkit came from Trenchant. 

    L3Harris sells Trenchant’s hacking and surveillance tools exclusively to the U.S. government and its allies in the so-called Five Eyes intelligence alliance, which includes Australia, Canada, New Zealand, and the United Kingdom. Given Trenchant’s limited number of customers, it’s possible that Coruna was originally acquired and used by one of these governments’ intelligence agencies before falling into unintended hands, though it’s unclear how much of the published Coruna hacking toolkit were developed by L3Harris Trenchant.

    An L3Harris spokesperson did not respond to a request for comment.

    How Coruna went from the hands of a Five Eyes government contractor to a Russian government hacking group, and then to a Chinese cybercrime gang is unclear. 

    But some of the circumstances appear similar to the case of Peter Williams, a former general manager at Trenchant. From 2022 until he resigned in mid-2025, Williams sold eight company hacking tools to Operation Zero, a Russian company that offers millions of dollars in exchange for zero-day exploits, meaning vulnerabilities that are unknown to the affected vendor. 

    Williams, a 39-year-old Australian citizen, was sentenced to seven years in prison last month, after he admitted to stealing and selling the eight Trenchant hacking tools to Operation Zero for $1.3 million.  

    The U.S. government said Williams, who took advantage of having “full access” to Trenchant’s networks, “betrayed” the United States and its allies. Prosecutors accused him of leaking tools that could have allowed whoever used them to “potentially access millions of computers and devices around the world,” suggesting the tools relied on vulnerabilities affecting widely used software like iOS.  

    Operation Zero, which was sanctioned by the U.S. government last month, claims to work exclusively with the Russian government and local companies. The U.S Treasury claimed that the Russian broker sold Williams’ “stolen tools to at least one unauthorized user.”

    That would explain how the Russian espionage group, which Google has only identified as UNC6353, acquired Coruna and deployed it on compromised Ukrainian websites so that it would hack certain iPhone users from a specific geolocation who unwittingly visited the malicious site.

    It is possible that once Operation Zero acquired Coruna and potentially sold it to the Russian government, the broker then resold the toolkit to someone else, perhaps another broker, another country, or even directly to cybercriminals. The Treasury alleged that a member of the Trickbot ransomware gang worked with Operation Zero, tying the broker to financially motivated hackers.

    At that point, Coruna may have passed to other hands until it reached Chinese hackers. According to U.S. prosecutors, Williams recognized code that he wrote and sold to Operation Zero later being used by a South Korean broker.

    the logo Kaspersky made for Operation Triangulation next to the L3Harris logo. Image: Kaspersky and L3Harris

    Operation Triangulation

    Google researchers wrote on Tuesday that two specific Coruna exploits and underlying vulnerabilities, called Photon and Gallium by their original developers, were used as zero-days in Operation Triangulation, a sophisticated hacking campaign allegedly used against Russian iPhone users. Operation Triangulation was first revealed by Kaspersky in 2023. 

    Rocky Cole, the co-founder of iVerify, told TechCrunch that “the best explanation based on what’s known right now” points to Trenchant and the U.S. government being the original developers and customers of Coruna. Although, Cole added, he isn’t claiming this “definitively.”

    That assessment, he said, is based on three factors. The timeline of Coruna’s use lines up with the Williams’ leaks, the structure of three modules — Plasma, Photon, and Gallium — found in Coruna bear strong similarities with Triangulation, and Coruna re-used some of the same exploits used in that operation, he said.

    According to Cole, “people close to the defense community” claim Plasma was used in Operation Triangulation, “although there’s no public evidence of that.” (Cole previously worked at the U.S. National Security Agency.)

    According to Google and iVerify, Coruna was designed to hack iPhone models running iOS 13 through 17.2.1, released between September 2019 and December 2023. Those dates line up with the timeline of some of Williams’s leaks, and the discovery of Operation Triangulation. 

    One of the former Trenchant employees told TechCrunch that when Triangulation was first revealed in 2023, other employees at the company believed that at least one of the zero-days caught by Kaspersky “were from us, and potentially ‘ripped out’ of the” overarching project that included Coruna.

    Another breadcrumb that points to Trenchant — as security researcher Costin Raiu noted — is the use of bird names for some of the 23 tools, such as Cassowary, Terrorbird, Bluebird, Jacurutu, and Sparrow. In 2021, The Washington Post revealed that Azimuth, one of the two startups later acquired by L3Harris and merged into Trenchant, had sold a hacking tool called Condor to the FBI in the infamous San Bernardino iPhone cracking case. 

    After Kaspersky published its research on Operation Triangulation, Russia’s Federal Security Service (FSB) accused the NSA of hacking “thousands” of iPhones in Russia, targeting diplomats in particular. A Kaspersky spokesperson said at the time that the company did not have information on the FSB’s claims. The spokesperson did note that “indicators of compromise” — meaning evidence of a hack — identified by the Russian National Coordination Centre for Computer Incidents (NCCCI) were the same ones that Kaspersky had identified.

    Boris Larin, a security researcher at Kaspersky, told TechCrunch in an email that “despite our extensive research, we are unable to attribute Operation Triangulation to any known [Advanced Persistent Threat] group or exploit development company.” 

    Larin explained that Google linked Coruna to Operation Triangulation because they both exploit the same two vulnerabilities — Photon and Gallium. 

    “Attribution cannot be based solely on the fact of exploitation of these vulnerabilities. All the details of both vulnerabilities have long been publicly available,” and thus anyone could have taken advantage of them, he said, adding that those two shared vulnerabilities “are just the tip of the iceberg.”  

    Kaspersky never publicly accused the U.S. government of being behind Operation Triangulation. Curiously, the logo that the company created for the campaign — an apple logo composed of several triangles — is reminiscent of the L3Harris logo. It may not be a coincidence. Kaspersky has previously said it wouldn’t attribute a hacking campaign publicly while quietly signaling that it actually knew who was behind it, or who provided the tools for it.

    In 2014, Kaspersky announced that it had caught a sophisticated and elusive government hacking group known as “Careto” (Spanish for “The Mask”). The company only said the hackers spoke Spanish. But the illustration of a mask that the company used in its report included the red and yellow colors of Spain’s flag, bull’s horns and nose ring, and castanets.

    As TechCrunch revealed last year, Kaspersky researchers had privately concluded that “there was no doubt,” as one of them put it, that Careto was run by the Spanish government. 

    On Wednesday, cybersecurity journalist Patrick Gray said on an episode of his podcast Risky Business that he thought — based on “bits and pieces” he was confident about — that what Williams leaked to Operation Zero was the hacking kit used in the Triangulation campaign.   

    Apple, Google, Kaspersky, and Operation Zero did not respond to requests for comment.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleThis Is The Most Dependable Midsize Pickup Of 2026, According To JD Power
    Next Article 5 Fun Gadgets You Didn’t Know You Can Buy At Home Depot
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Your browser’s payment autofill can be hacked. Use these 3 alternatives instead

    March 16, 2026

    Gigabyte MO27Q28G review: A great entry-level OLED monitor

    March 16, 2026

    Ditch recurring fees and own Office 2021 Professional for under $40

    March 16, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025720 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025306 Views

    Wired Headphones Are Making A Comeback, And We Have Gen Z To Thank

    July 22, 2025213 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025178 Views
    Don't Miss
    Technology March 16, 2026

    Your browser’s payment autofill can be hacked. Use these 3 alternatives instead

    Your browser’s payment autofill can be hacked. Use these 3 alternatives instead Skip to content…

    Gigabyte MO27Q28G review: A great entry-level OLED monitor

    Ditch recurring fees and own Office 2021 Professional for under $40

    Shopify says purchases are coming ‘inside ChatGPT’ through agentic storefronts as OpenAI retreats on Instant Checkout

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Your browser’s payment autofill can be hacked. Use these 3 alternatives instead

    March 16, 20264 Views

    Gigabyte MO27Q28G review: A great entry-level OLED monitor

    March 16, 20264 Views

    Ditch recurring fees and own Office 2021 Professional for under $40

    March 16, 20265 Views
    Most Popular

    Bench is charging people for services they already paid for, some customers say

    March 15, 20250 Views

    Major strike by Fujitsu staff at ‘cash cow’ HMRC

    March 15, 20250 Views

    These Laptop Stands Run My Household, and Life Is Better for It

    March 16, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.