BlockNews
FOLLOW ON X
  • BITCOIN
  • CRYPTO
    • ETHEREUM
    • RIPPLE XRP
    • SOLANA
    • CARDANO
    • BINANCE BNB
    • DOGECOIN
    • TRON
    • SUI
    • CHAINLINK
    • LITECOIN
  • FINANCE
  • POLITICS
  • MEMECOINS
  • NFT
  • OPINION
No Result
View All Result
BlockNews
  • BITCOIN
  • CRYPTO
    • ETHEREUM
    • RIPPLE XRP
    • SOLANA
    • CARDANO
    • BINANCE BNB
    • DOGECOIN
    • TRON
    • SUI
    • CHAINLINK
    • LITECOIN
  • FINANCE
  • POLITICS
  • MEMECOINS
  • NFT
  • OPINION
No Result
View All Result
BlockNews
Home CRYPTO

iPhone Crypto Wallet Hack Warning – Here Is How Coruna Targets iOS Devices

Michael Juanico by Michael Juanico
March 5, 2026
in CRYPTO, FINANCE, OPINION
Share on XShare in TelegramShare on Reddit
  • A new exploit kit called Coruna targets older iPhones to steal crypto wallet data
  • The attack uses multiple vulnerabilities to bypass Apple’s security protections
  • Recovery phrases and wallet credentials are the primary targets for hackers

A newly discovered iPhone vulnerability is raising concern across the crypto space, particularly among users who store wallet data on mobile devices. Security researchers say a sophisticated exploit toolkit known as Coruna is actively targeting older iPhones, potentially allowing attackers to steal sensitive crypto information, including wallet recovery phrases. For investors who rely on mobile wallets to store assets like Bitcoin or Ethereum, that possibility alone is enough to trigger alarm.

The warning comes from the Google Threat Intelligence Group, which recently revealed that the exploit is scanning devices running outdated versions of Apple’s mobile software. iPhones operating between iOS 13 and iOS 17.2.1 appear to be the primary targets. Devices that have not been updated may face significantly higher risk if exposed to the exploit.

How the Coruna Attack Breaks Into iPhones

Unlike typical malware campaigns, Coruna is built as a complex exploit system rather than a single malicious program. Researchers say the toolkit combines five full exploit chains and at least 23 vulnerabilities to gain access to targeted devices. That layered approach allows attackers to bypass several of Apple’s security defenses in sequence.

The attack usually begins when a user visits a compromised or malicious website. Hidden JavaScript embedded in the page quietly scans the visitor’s device, identifying details such as the iPhone model, operating system version, and active security settings. If the device matches a vulnerable configuration, the exploit chain begins automatically.

Spyware Installation and Data Extraction

Once the exploit successfully bypasses the device’s protections, the malware escalates its system privileges. This allows attackers to install spyware directly onto the iPhone without the user noticing anything unusual. From there, the spyware can begin searching through device data for sensitive information.

Researchers say the malware is specifically designed to locate crypto wallet files, account credentials, and mnemonic recovery phrases. These phrases are essentially the master keys for cryptocurrency wallets. Anyone who obtains them can recreate the wallet on another device and transfer the assets within minutes.

Crypto Wallets Are the Primary Target

Because of how crypto wallets work, recovery phrases represent one of the most valuable targets for attackers. If hackers gain access to those phrases, they can instantly restore the wallet on their own device and move the funds out. Victims often discover the theft only after the transactions have already been completed.

Investigators say the Coruna campaign spreads through what are known as “watering hole” attacks. Hackers compromise websites that crypto users frequently visit, including fake trading platforms, phishing portals, or imitation wallet services. Anyone visiting these pages with a vulnerable iPhone could unknowingly trigger the exploit.

Possible Links to Nation-State Cyber Tools

Security firm iVerify has noted that parts of Coruna’s code resemble tools believed to have originated from U.S. government cyber programs. While this does not necessarily mean the exploit was developed by a government, it suggests that components of advanced cyber tools may have leaked into the wider hacking ecosystem.

Researchers now suspect the toolkit could be used by cybercriminal groups as well as intelligence-linked actors from countries such as Russia or China. If confirmed, the campaign could represent one of the first large-scale mobile exploits derived from nation-state cyber capabilities targeting the crypto sector.

Disclaimer: BlockNews provides independent reporting on crypto, blockchain, and digital finance. All content is for informational purposes only and does not constitute financial advice. Readers should do their own research before making investment decisions. Some articles may use AI tools to assist in drafting, but every piece is reviewed and edited by our editorial team of experienced crypto writers and analysts before publication.
Tags: Crypto SecurityCrypto WalletsCyber AttackiOS exploitiPhone hackwallet security
TweetShareShare
Michael Juanico

Michael Juanico

Michael is a BSBA Management graduate from Mindanao State University and has been a professional content writer since 2019. He began exploring cryptocurrency in 2021 and has since made blockchain and digital assets his primary focus. For nearly four years, Michael has contributed research and editorial content at Aiur Labs and BlockNews, producing clear and accessible coverage of market trends, trading strategies, and project developments. He is transparent about his personal holdings in Bitcoin, TRON, and select meme tokens, combining writing expertise with hands-on market experience to deliver trustworthy insights to readers.

DON'T MISS THESE! HOT OFF THE PRESS

Pi Network Crypto Surges 12% – Here Is Whether PI Can Reach $0.30 Next
CRYPTO

Pi Network Crypto Surges 12% – Here Is Whether PI Can Reach $0.30 Next

March 5, 2026
Shiba Inu Crypto Price to $0.0089 by 2050 – Here Is the SHIB Forecast
CRYPTO

Shiba Inu Crypto Price to $0.0089 by 2050 – Here Is the SHIB Forecast

March 5, 2026
Dogecoin Struggles Near $0.09 – Here Is Why $0.50 Looks Hard for Crypto
CRYPTO

Dogecoin Struggles Near $0.09 – Here Is Why $0.50 Looks Hard for Crypto

March 5, 2026
Bitwise Donates ETF Profits to Bitcoin Developers – Here Is Why It Matters
BITCOIN

Bitwise Donates ETF Profits to Bitcoin Developers – Here Is Why It Matters

March 4, 2026
Tom Lee Says Crypto Bottom May Be Forming – Here Is Why Markets Look Strong
BITCOIN

Tom Lee Says Crypto Bottom May Be Forming – Here Is Why Markets Look Strong

March 4, 2026
Shiba Inu Slides 60% in a Year – Here Is Why the SHIB Hype Is Fading
CRYPTO

Shiba Inu Slides 60% in a Year – Here Is Why the SHIB Hype Is Fading

March 4, 2026
Load More

Related News

iPhone Crypto Wallet Hack Warning – Here Is How Coruna Targets iOS Devices

iPhone Crypto Wallet Hack Warning – Here Is How Coruna Targets iOS Devices

March 5, 2026
Pi Network Crypto Surges 12% – Here Is Whether PI Can Reach $0.30 Next

Pi Network Crypto Surges 12% – Here Is Whether PI Can Reach $0.30 Next

March 5, 2026
Shiba Inu Crypto Price to $0.0089 by 2050 – Here Is the SHIB Forecast

Shiba Inu Crypto Price to $0.0089 by 2050 – Here Is the SHIB Forecast

March 5, 2026
Dogecoin Struggles Near $0.09 – Here Is Why $0.50 Looks Hard for Crypto

Dogecoin Struggles Near $0.09 – Here Is Why $0.50 Looks Hard for Crypto

March 5, 2026
Bitwise Donates ETF Profits to Bitcoin Developers – Here Is Why It Matters

Bitwise Donates ETF Profits to Bitcoin Developers – Here Is Why It Matters

March 4, 2026
Twitter Telegram Threads

BLOCKNEWS.COM

BlockNews is your premier source for real-time cryptocurrency, blockchain, political and financial market news.

Stay ahead of the herd with BlockNews

RESOURCES

  • About Us
  • Contact Us
  • Editorial Policies
  • Terms and Conditions
  • Privacy Policy
  • Sitemap

DISCLOSURES AND POLICIES

BlockNews provides independent reporting on crypto, blockchain, and digital finance. Content is for informational purposes only and does not constitute financial advice. Sponsored material is always disclosed. By using this site, you agree to our Terms and Conditions and Privacy Policy.

© 2025 BlockNews

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
No Result
View All Result
  • HOME
  • BITCOIN
  • CRYPTO
    • ETHEREUM
    • RIPPLE XRP
    • SOLANA
    • CARDANO
    • BINANCE BNB
    • DOGECOIN
    • TRON
    • LITECOIN
    • CHAINLINK
    • SUI
  • MEMECOINS
  • POLITICS
  • FINANCE
  • NFT
  • DEFI
  • GUIDES

© 2025 BlockNews