Coruna: The iOS Exploit Kit Bringing Nation-State Capabilities to Mass Attacks

Coruna is a modular iOS exploit kit using multiple zero-day chains for full device compromise, persistent data access, and targeted app surveillance. Once exclusive to nation-states, Coruna shows a broader shift: advanced mobile exploitation is now scalable, repeatable, and increasingly accessible.

What is Coruna?

Coruna is a sophisticated iOS exploit framework composed of 23 exploits across five full exploit chains, targeting devices running iOS 13 through 17.2.1.

It enables attackers to move from initial access to full device compromise through a staged, modular architecture:

01

Safari-based Remote Code Execution (RCE) to gain initial access

02

Local Privilege Escalation
to take control of the device

03

Multi-stage implants
injected into trusted iOS processes

04

Dynamic modules
deployed based on apps installed on the device

Unlike traditional spyware campaigns, Coruna is not limited to highly targeted victims. Any user who visits a compromised website on a vulnerable device can be infected. This marks a shift from targeted surveillance to repeatable, scalable mobile exploitation.

Why Coruna Matters to Enterprise Security

Why Coruna Matters to Enterprise Security

Coruna exposes critical gaps in how organizations must think about mobile risk.

Mobile devices are now a primary attack surface for enterprise access.

Coruna exposes critical gaps in how organizations must think about mobile risk.

Mobile devices are now a primary attack surface for enterprise access.

Nation-state capabilities are no longer contained
Exploit chains once used for high-value targets are now reusable and scalable

Mobile compromise bypasses traditional controls
Device-level access enables interception of credentials, communications, and enterprise data

Targeting is no longer required
Watering hole delivery means any employee device can become an entry point

Security visibility breaks down
Exploits operate inside legitimate system processes with no standalone malware artifacts

On-Demand Coruna Threat Briefing

iVerify researchers independently analyzed Coruna, including exploit chains, infrastructure, and payload behavior.

WHAT YOU'LL LEARN

  • How Coruna achieves full device compromise across multiple iOS versions

  • Why traditional mobile security tools fail to detect it

  • How modular exploit kits are changing enterprise mobile risk

  • What organizations must do to detect and respond

How Coruna Works

Coruna uses a multi-stage exploit chain and modular payload delivery system:

Initial Access (Web-Based Exploit)

  • Delivered via compromised legitimate websites

  • No one-time links or strict targeting

  • Triggers Safari-based RCE on vulnerable devices

Privilege Escalation

  • Exploit chain escalates privileges to gain full device control

  • Includes environment checks (iOS version, Safari context, anti-analysis signals)

Multi-Stage Implant Deployment

  • Stage 2 payload executes inside powerd

  • Stage 3 payload executes inside locationd (CorePayload)

  • Establishes communication with command-and-control (C2) infrastructure

Modular Surveillance & Data Access

  • Dynamically loads modules based on installed apps

  • Injects into processes such as:

    • imagent (messaging / C2 communication)

    • SpringBoard (system-level control)

    • Third-party apps (including crypto wallets and messaging apps)

Data Collection & Exfiltration

  • Accesses:

    • Messages and communications

    • Photos and Apple Notes

    • App-specific data (including crypto wallets)

  • Uses legitimate system processes for stealthy exfiltration

Key Characteristics of Coruna

This is not just malware; it's a flexible exploitation platform.

Modular architecture
Dynamically adapts to each device

Process injection
No standalone malicious app or binary

Fileless + low-artifact execution
Minimal traditional indicators

Persistent + transient components
Survives across sessions in some cases

App-aware targeting
Deploys modules based on installed applications

How iVerify Detects Coruna

Coruna is designed to evade traditional detection by:

  • Avoiding standalone malware processes

  • Injecting into trusted system services

  • Using legitimate OS behavior for communication and persistence

  • Standard log cleaning to hide the exploit chain

Traditional tools—focused on apps, signatures, or policy enforcement—miss this activity.

iVerify takes a fundamentally different approach:

Live Infection Detection

Detects active Coruna infections on iOS and Android devices in real-time and trigger immediate response actions.

Behavioral Analysis

Identify exploitation by monitoring abnormal activity in system processes like powerd, locationd, and imagent.

Threat Hunting

Surface past infections through forensic artifacts, including: crash logs, sysdiagnose data, backup analysis.

Network & C2 Detection

Detect suspicious communication patterns, including: abnormal user agents across system processes, unexpected network activity from non-networking services.

Forensic Indicators

Validate compromise using: file system artifacts (temporary and persistent), safari history (infection domains), log anomalies and thread activity.

Historical Validation

Determine whether devices were previously compromised, even before patches were applied.

Executive Brief: Coruna Threat Intelligence

Get a concise, executive-ready breakdown of Coruna and its implications for enterprise security.

KEY TAKEAWAYS INCLUDE:

  • Overview of Coruna's exploit chains and modular architecture

  • How nation-state capabilities are scaling into broader use

  • Enterprise risk and business impact

  • Recommended strategies for detection and response

Protect Your Organization from Advanced Mobile Expoits

Coruna demonstrates how quickly advanced mobile threats are evolving—from targeted surveillance tools to scalable attack frameworks. Organizations that rely on traditional mobile security approaches lack the visibility needed to detect these threats.

See how your organization could detect Coruna, with a free trial of iVerify.

Coruna FAQs

Who is targeted by Coruna?

What makes Coruna different from traditional mobile malware?

What data can Coruna access?

Does Coruna require user interaction?

Can Coruna bypass enterprise security controls like MFA?

Does Coruna leave evidence on the device?

How does iVerify detect Coruna?