Saturday, 9 May 2026
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
logo logo
  • World
  • Politics
  • Crime
  • Economy
  • Tech & Science
  • Sports
  • Entertainment
  • More
    • Education
    • Celebrities
    • Culture and Arts
    • Environment
    • Health and Wellness
    • Lifestyle
  • 🔥
  • Trump
  • House
  • ScienceAlert
  • White
  • VIDEO
  • man
  • Trumps
  • Season
  • star
  • Years
Font ResizerAa
American FocusAmerican Focus
Search
  • World
  • Politics
  • Crime
  • Economy
  • Tech & Science
  • Sports
  • Entertainment
  • More
    • Education
    • Celebrities
    • Culture and Arts
    • Environment
    • Health and Wellness
    • Lifestyle
Follow US
© 2024 americanfocus.online – All Rights Reserved.
American Focus > Blog > Tech and Science > An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor
Tech and Science

An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor

Last updated: March 9, 2026 7:45 pm
Share
An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor
SHARE

Government as a security researcher before co-founding iVerify.)

“The fact that the Plasma, Photon, and Gallium modules are used in Triangulation, which is a known U.S. government operation, and are also in Coruna, which is almost certainly a Trenchant product, is indicative of a connection,” said Cole.

The broader implications of the theft and misuse of these tools are still unknown. The U.S. government has long relied on contractors like L3Harris to develop and provide hacking tools for intelligence operations, but leaks like those by Williams and others have shown the risks of outsourcing such sensitive capabilities.  

It’s also unclear how many more tools have been leaked or stolen, and how widely they have been used. Google’s report last week is a rare insight into how some of the most sophisticated hacking tools are developed and used, and how they can end up in the hands of governments and criminals alike. 

For now, the focus will be on containing the fallout from the leaks and continuing to track how these tools are used by various threat actors. And as more details emerge, the full extent of the damage caused by the unauthorized use of these tools will become clearer.

The mass hacking campaign targeting iPhone users in Ukraine and China has brought to light the use of sophisticated tools that may have originated from a U.S. military contractor, L3Harris. These tools, initially intended for Western intelligence agencies, have now been used by various hacking groups, including Russian government spies and Chinese cybercriminals.

Google recently revealed the existence of a powerful iPhone-hacking toolkit named “Coruna,” which consists of 23 different components and was first used in targeted operations by an unnamed government customer of a surveillance vendor. Subsequently, Russian government spies used it against Ukrainians, while Chinese cybercriminals employed it in broader campaigns to steal money and cryptocurrency.

Researchers at iVerify, a mobile cybersecurity company, independently analyzed Coruna and suggested that it may have been originally developed by a company that sold it to the U.S. government. Two former employees of L3Harris confirmed that Coruna was likely developed by the company’s hacking and surveillance tech division, Trenchant.

See also  Donald Trump’s Russian oil waiver offers little relief for India

L3Harris exclusively sells Trenchant’s hacking and surveillance tools to the U.S. government and its allies in the Five Eyes intelligence alliance. It is speculated that Coruna may have been acquired by one of these governments before ending up in the hands of unauthorized users like Russian and Chinese hackers.

The case of Peter Williams, a former general manager at Trenchant, who sold company hacking tools to a Russian company, Operation Zero, sheds light on how such tools can be misused. Williams was sentenced to seven years in prison for selling Trenchant’s tools to Operation Zero, which then potentially sold them to Russian hackers and cybercriminals.

The unauthorized use of Coruna by various threat actors, including Russian and Chinese hackers, raises concerns about the security implications of leaked and stolen hacking tools. The risks associated with outsourcing sensitive capabilities to contractors like L3Harris are evident, and the extent of damage caused by the unauthorized use of such tools remains to be fully understood.

As the investigation into the mass hacking campaign unfolds, efforts will focus on containing the fallout from the leaks and monitoring how these tools are utilized by different threat actors. The incident serves as a reminder of the complex landscape of cybersecurity and the challenges posed by the proliferation of sophisticated hacking tools in both government and criminal hands. The National Security Agency (NSA) has been at the center of a recent controversy involving the hacking of iPhone models running iOS 13 through 17.2.1. The operation, known as Coruna, was designed to exploit vulnerabilities in these devices, with links to leaks by former NSA contractor Edward Williams and the discovery of Operation Triangulation.

Coruna’s targeting of iPhones between September 2019 and December 2023 aligns with the timeline of Williams’s leaks, raising suspicions about the NSA’s involvement in the hacking campaign. Former employees of Trenchant, a company believed to be connected to the NSA, pointed to similarities between the tools used in Coruna and those developed by Trenchant, such as the use of bird names like Cassowary and Sparrow.

See also  Alleged customers at high-end brothel serving politicians, military officials unmasked in court as salacious details of encounters revealed

The aftermath of Kaspersky’s research on Operation Triangulation saw the Russian Federal Security Service accusing the NSA of hacking thousands of iPhones in Russia, particularly targeting diplomats. Despite these allegations, Kaspersky was unable to definitively attribute the operation to any specific group or entity, highlighting the complexity of cybersecurity investigations.

The use of common vulnerabilities in both Coruna and Operation Triangulation, namely Photon and Gallium, raised suspicions of a potential link between the two campaigns. However, Kaspersky refrained from publicly accusing the U.S. government of involvement, leaving room for speculation about the true orchestrators behind these hacking efforts.

In light of past instances where Kaspersky privately attributed hacking campaigns to specific governments, such as the “Careto” group linked to the Spanish government, questions arose about the true motives behind Operation Triangulation. Cybersecurity experts like Patrick Gray suggested that the leaked information from Operation Zero may have revealed the hacking tools used in the Triangulation campaign, hinting at a possible connection to government entities.

As the controversy surrounding Coruna and Operation Triangulation continues to unfold, key players like Apple, Google, Kaspersky, and Operation Zero remain silent on the matter. The intricate web of cybersecurity threats and government espionage underscores the importance of vigilance in safeguarding digital privacy and national security in an increasingly interconnected world. The world of technology is constantly evolving, with new advancements and innovations being made every day. One of the most exciting developments in recent years is the rise of artificial intelligence (AI). AI is revolutionizing the way we live and work, with its ability to perform tasks that typically require human intelligence, such as speech recognition, decision-making, and problem-solving.

One of the key areas where AI is making a significant impact is in the field of healthcare. From diagnosing diseases to improving patient care, AI is transforming the way healthcare is delivered. AI-powered tools can analyze large amounts of medical data to identify patterns and trends that may not be immediately apparent to human doctors. This can lead to earlier detection of diseases, more accurate diagnoses, and more personalized treatment plans for patients.

See also  Bill Clinton Hospitalized With Flu, Influenza A Surges Throughout U.S.

AI is also being used to improve the efficiency of healthcare systems. For example, AI-powered scheduling systems can help hospitals and clinics better manage their resources, reducing wait times for patients and allowing healthcare providers to see more patients in a day. AI can also help streamline administrative tasks, freeing up healthcare professionals to focus on providing quality care to their patients.

In addition to improving patient care, AI is also being used to advance medical research. AI algorithms can analyze vast amounts of data to identify potential drug candidates, predict the outcomes of clinical trials, and even discover new uses for existing drugs. This has the potential to accelerate the development of new treatments and cures for a wide range of diseases.

Despite the many benefits of AI in healthcare, there are also challenges and concerns that need to be addressed. One of the biggest concerns is the potential for bias in AI algorithms, which could lead to disparities in healthcare outcomes for certain groups of patients. Additionally, there are ethical considerations surrounding the use of AI in healthcare, such as privacy concerns and the need to ensure that patients are fully informed about how their data is being used.

Overall, the potential of AI in healthcare is vast, and its impact on the industry is likely to continue to grow in the coming years. By harnessing the power of AI, healthcare providers can improve patient care, increase efficiency, and advance medical research in ways that were previously unimaginable. As AI technology continues to evolve, the possibilities for its applications in healthcare are truly limitless.

TAGGED:contractoriPhonehackingmilitaryRussianSpiesToolkitU.S
Share This Article
Twitter Email Copy Link Print
Previous Article Everything to Know About Eric Dane’s Girlfriend Janell Shirtcliff Everything to Know About Eric Dane’s Girlfriend Janell Shirtcliff
Next Article Chanel Fall 2026 Ready-to-Wear Collection Chanel Fall 2026 Ready-to-Wear Collection
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.

Popular Posts

John Lithgow Considered Quitting Harry Potter Over JK Rowling Backlash

HBO Max's new "Harry Potter" TV series faced the potential departure of its Albus Dumbledore.…

March 20, 2026

Extreme heat poses Spanish-style blackout threat to UK electrical grid

How Rising Temperatures Could Impact the UK’s Electrical Grid Hot weather can stress power linesPeter…

May 3, 2025

President George Washington’s Birthday, 2026 – The White House

By the President of the United States of America A Proclamation Today, we gather as…

February 16, 2026

Google’s Gemini app has surpassed 750M monthly active users

Google’s AI chatbot Gemini has reached a milestone with over 750 million monthly active users…

February 4, 2026

Elie Saab Pre-Fall 2026 Collection

Elie Saab: Drawing Inspiration from Beirut for Pre-Fall Collection Elie Saab, the renowned fashion designer,…

January 19, 2026

You Might Also Like

Iran Warns The U.S. Against Attacks On Its Oil Tankers And Other Ships But Ceasefire Appears To Hold
World News

Iran Warns The U.S. Against Attacks On Its Oil Tankers And Other Ships But Ceasefire Appears To Hold

May 9, 2026
5,000 vibe-coded apps just proved shadow AI is the new S3 bucket crisis
Tech and Science

5,000 vibe-coded apps just proved shadow AI is the new S3 bucket crisis

May 9, 2026
A vast dam across the Bering Strait could stop the AMOC collapsing
Tech and Science

A vast dam across the Bering Strait could stop the AMOC collapsing

May 9, 2026
Huawei Launches New Line of Wearables
Tech and Science

Huawei Launches New Line of Wearables

May 9, 2026
logo logo
Facebook Twitter Youtube

About US


Explore global affairs, political insights, and linguistic origins. Stay informed with our comprehensive coverage of world news, politics, and Lifestyle.

Top Categories
  • Crime
  • Environment
  • Sports
  • Tech and Science
Usefull Links
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA

© 2024 americanfocus.online –  All Rights Reserved.

Welcome Back!

Sign in to your account

Lost your password?