Sunday, 19 Apr 2026
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
logo logo
  • World
  • Politics
  • Crime
  • Economy
  • Tech & Science
  • Sports
  • Entertainment
  • More
    • Education
    • Celebrities
    • Culture and Arts
    • Environment
    • Health and Wellness
    • Lifestyle
  • 🔥
  • Trump
  • House
  • ScienceAlert
  • White
  • VIDEO
  • man
  • Trumps
  • Season
  • star
  • Years
Font ResizerAa
American FocusAmerican Focus
Search
  • World
  • Politics
  • Crime
  • Economy
  • Tech & Science
  • Sports
  • Entertainment
  • More
    • Education
    • Celebrities
    • Culture and Arts
    • Environment
    • Health and Wellness
    • Lifestyle
Follow US
© 2024 americanfocus.online – All Rights Reserved.
American Focus > Blog > Tech and Science > An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor
Tech and Science

An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor

Last updated: March 9, 2026 7:45 pm
Share
An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor
SHARE

Government as a security researcher before co-founding iVerify.)

“The fact that the Plasma, Photon, and Gallium modules are used in Triangulation, which is a known U.S. government operation, and are also in Coruna, which is almost certainly a Trenchant product, is indicative of a connection,” said Cole.

The broader implications of the theft and misuse of these tools are still unknown. The U.S. government has long relied on contractors like L3Harris to develop and provide hacking tools for intelligence operations, but leaks like those by Williams and others have shown the risks of outsourcing such sensitive capabilities.  

It’s also unclear how many more tools have been leaked or stolen, and how widely they have been used. Google’s report last week is a rare insight into how some of the most sophisticated hacking tools are developed and used, and how they can end up in the hands of governments and criminals alike. 

For now, the focus will be on containing the fallout from the leaks and continuing to track how these tools are used by various threat actors. And as more details emerge, the full extent of the damage caused by the unauthorized use of these tools will become clearer.

The mass hacking campaign targeting iPhone users in Ukraine and China has brought to light the use of sophisticated tools that may have originated from a U.S. military contractor, L3Harris. These tools, initially intended for Western intelligence agencies, have now been used by various hacking groups, including Russian government spies and Chinese cybercriminals.

Google recently revealed the existence of a powerful iPhone-hacking toolkit named “Coruna,” which consists of 23 different components and was first used in targeted operations by an unnamed government customer of a surveillance vendor. Subsequently, Russian government spies used it against Ukrainians, while Chinese cybercriminals employed it in broader campaigns to steal money and cryptocurrency.

Researchers at iVerify, a mobile cybersecurity company, independently analyzed Coruna and suggested that it may have been originally developed by a company that sold it to the U.S. government. Two former employees of L3Harris confirmed that Coruna was likely developed by the company’s hacking and surveillance tech division, Trenchant.

See also  Earthquake Sensors Detect Sonic Booms From Incoming Space Junk : ScienceAlert

L3Harris exclusively sells Trenchant’s hacking and surveillance tools to the U.S. government and its allies in the Five Eyes intelligence alliance. It is speculated that Coruna may have been acquired by one of these governments before ending up in the hands of unauthorized users like Russian and Chinese hackers.

The case of Peter Williams, a former general manager at Trenchant, who sold company hacking tools to a Russian company, Operation Zero, sheds light on how such tools can be misused. Williams was sentenced to seven years in prison for selling Trenchant’s tools to Operation Zero, which then potentially sold them to Russian hackers and cybercriminals.

The unauthorized use of Coruna by various threat actors, including Russian and Chinese hackers, raises concerns about the security implications of leaked and stolen hacking tools. The risks associated with outsourcing sensitive capabilities to contractors like L3Harris are evident, and the extent of damage caused by the unauthorized use of such tools remains to be fully understood.

As the investigation into the mass hacking campaign unfolds, efforts will focus on containing the fallout from the leaks and monitoring how these tools are utilized by different threat actors. The incident serves as a reminder of the complex landscape of cybersecurity and the challenges posed by the proliferation of sophisticated hacking tools in both government and criminal hands. The National Security Agency (NSA) has been at the center of a recent controversy involving the hacking of iPhone models running iOS 13 through 17.2.1. The operation, known as Coruna, was designed to exploit vulnerabilities in these devices, with links to leaks by former NSA contractor Edward Williams and the discovery of Operation Triangulation.

Coruna’s targeting of iPhones between September 2019 and December 2023 aligns with the timeline of Williams’s leaks, raising suspicions about the NSA’s involvement in the hacking campaign. Former employees of Trenchant, a company believed to be connected to the NSA, pointed to similarities between the tools used in Coruna and those developed by Trenchant, such as the use of bird names like Cassowary and Sparrow.

See also  Climate ‘Tipping Point’ Language Doesn’t Spur Action

The aftermath of Kaspersky’s research on Operation Triangulation saw the Russian Federal Security Service accusing the NSA of hacking thousands of iPhones in Russia, particularly targeting diplomats. Despite these allegations, Kaspersky was unable to definitively attribute the operation to any specific group or entity, highlighting the complexity of cybersecurity investigations.

The use of common vulnerabilities in both Coruna and Operation Triangulation, namely Photon and Gallium, raised suspicions of a potential link between the two campaigns. However, Kaspersky refrained from publicly accusing the U.S. government of involvement, leaving room for speculation about the true orchestrators behind these hacking efforts.

In light of past instances where Kaspersky privately attributed hacking campaigns to specific governments, such as the “Careto” group linked to the Spanish government, questions arose about the true motives behind Operation Triangulation. Cybersecurity experts like Patrick Gray suggested that the leaked information from Operation Zero may have revealed the hacking tools used in the Triangulation campaign, hinting at a possible connection to government entities.

As the controversy surrounding Coruna and Operation Triangulation continues to unfold, key players like Apple, Google, Kaspersky, and Operation Zero remain silent on the matter. The intricate web of cybersecurity threats and government espionage underscores the importance of vigilance in safeguarding digital privacy and national security in an increasingly interconnected world. The world of technology is constantly evolving, with new advancements and innovations being made every day. One of the most exciting developments in recent years is the rise of artificial intelligence (AI). AI is revolutionizing the way we live and work, with its ability to perform tasks that typically require human intelligence, such as speech recognition, decision-making, and problem-solving.

One of the key areas where AI is making a significant impact is in the field of healthcare. From diagnosing diseases to improving patient care, AI is transforming the way healthcare is delivered. AI-powered tools can analyze large amounts of medical data to identify patterns and trends that may not be immediately apparent to human doctors. This can lead to earlier detection of diseases, more accurate diagnoses, and more personalized treatment plans for patients.

See also  Fish-based pet food may expose cats and dogs to forever chemicals

AI is also being used to improve the efficiency of healthcare systems. For example, AI-powered scheduling systems can help hospitals and clinics better manage their resources, reducing wait times for patients and allowing healthcare providers to see more patients in a day. AI can also help streamline administrative tasks, freeing up healthcare professionals to focus on providing quality care to their patients.

In addition to improving patient care, AI is also being used to advance medical research. AI algorithms can analyze vast amounts of data to identify potential drug candidates, predict the outcomes of clinical trials, and even discover new uses for existing drugs. This has the potential to accelerate the development of new treatments and cures for a wide range of diseases.

Despite the many benefits of AI in healthcare, there are also challenges and concerns that need to be addressed. One of the biggest concerns is the potential for bias in AI algorithms, which could lead to disparities in healthcare outcomes for certain groups of patients. Additionally, there are ethical considerations surrounding the use of AI in healthcare, such as privacy concerns and the need to ensure that patients are fully informed about how their data is being used.

Overall, the potential of AI in healthcare is vast, and its impact on the industry is likely to continue to grow in the coming years. By harnessing the power of AI, healthcare providers can improve patient care, increase efficiency, and advance medical research in ways that were previously unimaginable. As AI technology continues to evolve, the possibilities for its applications in healthcare are truly limitless.

TAGGED:contractoriPhonehackingmilitaryRussianSpiesToolkitU.S
Share This Article
Twitter Email Copy Link Print
Previous Article Everything to Know About Eric Dane’s Girlfriend Janell Shirtcliff Everything to Know About Eric Dane’s Girlfriend Janell Shirtcliff
Next Article Chanel Fall 2026 Ready-to-Wear Collection Chanel Fall 2026 Ready-to-Wear Collection
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.

Popular Posts

Celeb Chef Andrew Zimmern Rips Diddy for Putting Apple Sauce on Burgers

Chef Andrew Zimmern Diddy's Apple Sauce On Burgers Is Yuck ... Just Like Him, Allegedly…

May 26, 2025

AUDIO: 911 Dispatch Call on Diane Keaton’s Death Reveals “Person Down” | The Gateway Pundit | by Cristina Laila

Hollywood luminary Diane Keaton, renowned for her pivotal roles in cinematic masterpieces such as “The…

October 12, 2025

Sofia Vergara’s Sister Got Real Estate License Before ‘Selling Sunset’

Sofia Vergara's Sister Sandra Lands Selling Sunset Job Despite her lack of a sales background,…

July 15, 2025

Medicare seeks lower prices for drugs, including Ozempic : Shots

Medicare has started price negotiations for 15 medicines, including the diabetes drug Ozempic. Mario Tama/Getty…

June 4, 2025

Tropical Depression 18 likely strengthening into Hurricane Rafael, hit Gulf Coast

MIAMI – Tropical Depression Eighteen is gaining strength and is expected to become Hurricane Rafael…

November 4, 2024

You Might Also Like

Why game theory could be critical in a nuclear war
Tech and Science

Why game theory could be critical in a nuclear war

April 19, 2026
Cracks are starting to form on fusion energy’s funding boom
Tech and Science

Cracks are starting to form on fusion energy’s funding boom

April 19, 2026
Why is it so hard to change your mind?
Tech and Science

Why is it so hard to change your mind?

April 19, 2026
Frontier models are failing one in three production attempts — and getting harder to audit
Tech and Science

Frontier models are failing one in three production attempts — and getting harder to audit

April 18, 2026
logo logo
Facebook Twitter Youtube

About US


Explore global affairs, political insights, and linguistic origins. Stay informed with our comprehensive coverage of world news, politics, and Lifestyle.

Top Categories
  • Crime
  • Environment
  • Sports
  • Tech and Science
Usefull Links
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA

© 2024 americanfocus.online –  All Rights Reserved.

Welcome Back!

Sign in to your account

Lost your password?