"DarkSword" Exploit Kit


Lookout Coverage and Recommendation for Admins
Lookout administrators should take the following actions to reduce risk from DarkSword and similar zero-click exploitation campaigns targeting vulnerable iOS devices:
- Enforce Minimum OS Versions:
- Prioritize remediation for devices running iOS 18.4–18.7, and apply compliance policies to restrict access from devices that are not fully updated.
- Enable Phishing & Content Protection (PCP):
- Ensure PCP is enabled across all managed devices to help detect and block access to malicious or suspicious URLs, including compromised legitimate websites used in watering hole attacks.
- Monitor and Remediate High-Risk Devices:
- Review Lookout alerts for suspicious web activity or exploit indicators, and isolate devices that show signs of compromise until they are updated or remediated.
Overview
Google’s Threat Intelligence Group (TAG) and Lookout researchers have disclosed a highly sophisticated zero-click mobile exploit kit known as DarkSword, discovered in March 2026. Primarily targeting iPhones, this threat marks a notable shift in the mobile threat landscape—from traditional, long-term state-sponsored surveillance campaigns to faster, “hit-and-run” operations focused on financial theft and rapid data exfiltration.
DarkSword targets vulnerable iOS devices through watering hole attacks conducted on compromised legitimate websites. When a user visits an affected site, the DarkSword delivery framework exploits a chain of six vulnerabilities—tracked as CVE-2025-31277, CVE-2025-43529, CVE-2026-20700, CVE-2025-14174, CVE-2025-43510, and CVE-2025-43520—to gain kernel-level access without requiring user interaction.
Notably, DarkSword operates as a fileless exploit, executing entirely in memory to evade detection and forensic analysis, and self-deleting once attack objectives are complete. This design makes the threat particularly difficult to detect using traditional security controls.
These vulnerabilities allow attackers to escape application sandboxes, escalate privileges, and achieve remote code execution on unpatched devices. Apple has addressed these flaws in recent iOS security updates. At present, exposure is limited to devices running iOS 18.4 through 18.7 that have not yet been updated to the latest available version.
The "Links" in the Chain
If successfully exploited, DarkSword enables attackers to progress from a simple website visit to full device compromise through the following sequence:
- Initial Access: The victim visits a compromised legitimate website that delivers the exploit chain to vulnerable devices.
- Code Execution: A browser vulnerability is triggered to gain initial execution within the web context.
- Sandbox Escape: Additional vulnerabilities allow the attacker to bypass browser isolation controls.
- Privilege Escalation: The attacker elevates privileges to gain deeper system-level access.
- Kernel Compromise: Kernel-level execution provides near-total control of the device.
- Data Theft and Cleanup: Fileless payloads execute in memory to access sensitive data and then self-delete to evade detection.
On March 20, 2026, CISA added three of the six DarkSword vulnerabilities (CVE-2025-31277, CVE-2025-43510, and CVE-2025-43520) to its catalog of Known Exploited Vulnerabilities (KEV), requiring Federal Civilian Executive Branch (FCEB) agencies to remediate affected systems by April 3, 2026. While this mandate applies specifically to federal agencies, enterprise organizations are strongly encouraged to follow a similar remediation timeline.
Lookout Analysis
Lookout identified infrastructure associated with DarkSword during investigations into activity related to the Coruna campaign. Based on observed infrastructure overlap and targeting patterns, Lookout assesses with high confidence that DarkSword activity is associated with Russian-aligned cyber-espionage operations and financially motivated threat activity.
More broadly, DarkSword reflects the continued proliferation of advanced mobile exploitation capabilities, where techniques historically associated with highly targeted Advanced Persistent Threat (APT) operations are spread through broker networks to cybercriminals and hacking groups, increasingly appearing in scalable delivery models such as watering hole attacks. This evolution lowers the barrier to entry for high-impact mobile attacks and expands the potential victim pool beyond traditionally targeted individuals to a wider population of vulnerable devices.
Authors


Lookout Mobile Endpoint Security
Stop Cyberattacks Before They Start With Industry-Leading Threat Intelligence.
Advanced mobile Endpoint Detection & Response powered by data from 185M+ apps and 200M+ devices on iOS, Android, ChromeOS.

