Monday, 9 Mar 2026
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
logo logo
  • World
  • Politics
  • Crime
  • Economy
  • Tech & Science
  • Sports
  • Entertainment
  • More
    • Education
    • Celebrities
    • Culture and Arts
    • Environment
    • Health and Wellness
    • Lifestyle
  • 🔥
  • Trump
  • House
  • ScienceAlert
  • VIDEO
  • White
  • man
  • Trumps
  • Season
  • Watch
  • star
Font ResizerAa
American FocusAmerican Focus
Search
  • World
  • Politics
  • Crime
  • Economy
  • Tech & Science
  • Sports
  • Entertainment
  • More
    • Education
    • Celebrities
    • Culture and Arts
    • Environment
    • Health and Wellness
    • Lifestyle
Follow US
© 2024 americanfocus.online – All Rights Reserved.
American Focus > Blog > Tech and Science > An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor
Tech and Science

An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor

Last updated: March 9, 2026 7:45 pm
Share
An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor
SHARE

Government as a security researcher before co-founding iVerify.)

“The fact that the Plasma, Photon, and Gallium modules are used in Triangulation, which is a known U.S. government operation, and are also in Coruna, which is almost certainly a Trenchant product, is indicative of a connection,” said Cole.

The broader implications of the theft and misuse of these tools are still unknown. The U.S. government has long relied on contractors like L3Harris to develop and provide hacking tools for intelligence operations, but leaks like those by Williams and others have shown the risks of outsourcing such sensitive capabilities.  

It’s also unclear how many more tools have been leaked or stolen, and how widely they have been used. Google’s report last week is a rare insight into how some of the most sophisticated hacking tools are developed and used, and how they can end up in the hands of governments and criminals alike. 

For now, the focus will be on containing the fallout from the leaks and continuing to track how these tools are used by various threat actors. And as more details emerge, the full extent of the damage caused by the unauthorized use of these tools will become clearer.

The mass hacking campaign targeting iPhone users in Ukraine and China has brought to light the use of sophisticated tools that may have originated from a U.S. military contractor, L3Harris. These tools, initially intended for Western intelligence agencies, have now been used by various hacking groups, including Russian government spies and Chinese cybercriminals.

Google recently revealed the existence of a powerful iPhone-hacking toolkit named “Coruna,” which consists of 23 different components and was first used in targeted operations by an unnamed government customer of a surveillance vendor. Subsequently, Russian government spies used it against Ukrainians, while Chinese cybercriminals employed it in broader campaigns to steal money and cryptocurrency.

Researchers at iVerify, a mobile cybersecurity company, independently analyzed Coruna and suggested that it may have been originally developed by a company that sold it to the U.S. government. Two former employees of L3Harris confirmed that Coruna was likely developed by the company’s hacking and surveillance tech division, Trenchant.

See also  The best budget electric bikes for 2025

L3Harris exclusively sells Trenchant’s hacking and surveillance tools to the U.S. government and its allies in the Five Eyes intelligence alliance. It is speculated that Coruna may have been acquired by one of these governments before ending up in the hands of unauthorized users like Russian and Chinese hackers.

The case of Peter Williams, a former general manager at Trenchant, who sold company hacking tools to a Russian company, Operation Zero, sheds light on how such tools can be misused. Williams was sentenced to seven years in prison for selling Trenchant’s tools to Operation Zero, which then potentially sold them to Russian hackers and cybercriminals.

The unauthorized use of Coruna by various threat actors, including Russian and Chinese hackers, raises concerns about the security implications of leaked and stolen hacking tools. The risks associated with outsourcing sensitive capabilities to contractors like L3Harris are evident, and the extent of damage caused by the unauthorized use of such tools remains to be fully understood.

As the investigation into the mass hacking campaign unfolds, efforts will focus on containing the fallout from the leaks and monitoring how these tools are utilized by different threat actors. The incident serves as a reminder of the complex landscape of cybersecurity and the challenges posed by the proliferation of sophisticated hacking tools in both government and criminal hands. The National Security Agency (NSA) has been at the center of a recent controversy involving the hacking of iPhone models running iOS 13 through 17.2.1. The operation, known as Coruna, was designed to exploit vulnerabilities in these devices, with links to leaks by former NSA contractor Edward Williams and the discovery of Operation Triangulation.

Coruna’s targeting of iPhones between September 2019 and December 2023 aligns with the timeline of Williams’s leaks, raising suspicions about the NSA’s involvement in the hacking campaign. Former employees of Trenchant, a company believed to be connected to the NSA, pointed to similarities between the tools used in Coruna and those developed by Trenchant, such as the use of bird names like Cassowary and Sparrow.

See also  Kim ready for talks if U.S. gives up denuclearization demand : NPR

The aftermath of Kaspersky’s research on Operation Triangulation saw the Russian Federal Security Service accusing the NSA of hacking thousands of iPhones in Russia, particularly targeting diplomats. Despite these allegations, Kaspersky was unable to definitively attribute the operation to any specific group or entity, highlighting the complexity of cybersecurity investigations.

The use of common vulnerabilities in both Coruna and Operation Triangulation, namely Photon and Gallium, raised suspicions of a potential link between the two campaigns. However, Kaspersky refrained from publicly accusing the U.S. government of involvement, leaving room for speculation about the true orchestrators behind these hacking efforts.

In light of past instances where Kaspersky privately attributed hacking campaigns to specific governments, such as the “Careto” group linked to the Spanish government, questions arose about the true motives behind Operation Triangulation. Cybersecurity experts like Patrick Gray suggested that the leaked information from Operation Zero may have revealed the hacking tools used in the Triangulation campaign, hinting at a possible connection to government entities.

As the controversy surrounding Coruna and Operation Triangulation continues to unfold, key players like Apple, Google, Kaspersky, and Operation Zero remain silent on the matter. The intricate web of cybersecurity threats and government espionage underscores the importance of vigilance in safeguarding digital privacy and national security in an increasingly interconnected world. The world of technology is constantly evolving, with new advancements and innovations being made every day. One of the most exciting developments in recent years is the rise of artificial intelligence (AI). AI is revolutionizing the way we live and work, with its ability to perform tasks that typically require human intelligence, such as speech recognition, decision-making, and problem-solving.

One of the key areas where AI is making a significant impact is in the field of healthcare. From diagnosing diseases to improving patient care, AI is transforming the way healthcare is delivered. AI-powered tools can analyze large amounts of medical data to identify patterns and trends that may not be immediately apparent to human doctors. This can lead to earlier detection of diseases, more accurate diagnoses, and more personalized treatment plans for patients.

See also  How the U.S. has used tariffs through history — and why Trump is different

AI is also being used to improve the efficiency of healthcare systems. For example, AI-powered scheduling systems can help hospitals and clinics better manage their resources, reducing wait times for patients and allowing healthcare providers to see more patients in a day. AI can also help streamline administrative tasks, freeing up healthcare professionals to focus on providing quality care to their patients.

In addition to improving patient care, AI is also being used to advance medical research. AI algorithms can analyze vast amounts of data to identify potential drug candidates, predict the outcomes of clinical trials, and even discover new uses for existing drugs. This has the potential to accelerate the development of new treatments and cures for a wide range of diseases.

Despite the many benefits of AI in healthcare, there are also challenges and concerns that need to be addressed. One of the biggest concerns is the potential for bias in AI algorithms, which could lead to disparities in healthcare outcomes for certain groups of patients. Additionally, there are ethical considerations surrounding the use of AI in healthcare, such as privacy concerns and the need to ensure that patients are fully informed about how their data is being used.

Overall, the potential of AI in healthcare is vast, and its impact on the industry is likely to continue to grow in the coming years. By harnessing the power of AI, healthcare providers can improve patient care, increase efficiency, and advance medical research in ways that were previously unimaginable. As AI technology continues to evolve, the possibilities for its applications in healthcare are truly limitless.

TAGGED:contractoriPhonehackingmilitaryRussianSpiesToolkitU.S
Share This Article
Twitter Email Copy Link Print
Previous Article Everything to Know About Eric Dane’s Girlfriend Janell Shirtcliff Everything to Know About Eric Dane’s Girlfriend Janell Shirtcliff
Next Article Chanel Fall 2026 Ready-to-Wear Collection Chanel Fall 2026 Ready-to-Wear Collection
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts

Cassie Testifies About Diddy, Escorts Urinating in Her Mouth at Freak Offs

The ongoing trial between Cassie and Sean "Diddy" Combs has revealed shocking details about their…

May 13, 2025

An Ikebana Artist and His Student Sow an Unconventional Approach to Flower Arranging — Colossal

Kosen Ohtsubo, a groundbreaking artist in the world of Japanese ikebana, is challenging traditional notions…

April 12, 2025

Trump Hits A New Low As His Base Splits Over Jeffrey Epstein

PoliticusUSA is corporate-free and proudly independent. Please consider supporting us by becoming a subscriber. Donald…

July 20, 2025

Copy Madison LeCroy’s All-Over Glow With This $38 Body Oil

If you're looking to achieve a beauty glow up this year, take a cue from…

January 11, 2026

The Best Soft Ballet Flats for Spring and Summer 2025

As the summer season approaches, it's time to swap out those cozy knits and boots…

April 28, 2025

You Might Also Like

Electric air taxi maker Archer hits back at Joby in countersuit alleging concealed Chinese ties
Tech and Science

Electric air taxi maker Archer hits back at Joby in countersuit alleging concealed Chinese ties

March 9, 2026
We’ve only just confirmed that Homo habilis really existed
Tech and Science

We’ve only just confirmed that Homo habilis really existed

March 9, 2026
Donald Trump’s Russian oil waiver offers little relief for India
Economy

Donald Trump’s Russian oil waiver offers little relief for India

March 9, 2026
Evolution Keeps Reinventing The Appendix. Here’s Why It May Be Important. : ScienceAlert
Tech and Science

Evolution Keeps Reinventing The Appendix. Here’s Why It May Be Important. : ScienceAlert

March 9, 2026
logo logo
Facebook Twitter Youtube

About US


Explore global affairs, political insights, and linguistic origins. Stay informed with our comprehensive coverage of world news, politics, and Lifestyle.

Top Categories
  • Crime
  • Environment
  • Sports
  • Tech and Science
Usefull Links
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA

© 2024 americanfocus.online –  All Rights Reserved.

Welcome Back!

Sign in to your account

Lost your password?