Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Report states that high-end AI is in procurement negotiations at a valuation of $2 billion

April 16, 2026

Europol sends email to 75,000 people asking them to stop DDoS attack

April 16, 2026

It's not just you — Blue Sky is (kinda) depressed

April 16, 2026
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Google brings Pixel 6 and new devices to Material3 Expressive, along with other features, to the Pixel 6 and new devices

    September 3, 2025

    Google's NoteBookLM now allows you to customize the tone of your AI podcasts

    September 3, 2025

    Roblox expands the use of age estimation techniques and introduces standardized assessments

    September 3, 2025

    Instagram finally launches the iPad app

    September 3, 2025

    Complete the 2025 Confusion Builder Stage Agenda with the Maximum Scaling Voice

    September 3, 2025
  • Crypto

    Last 2 days to save up to $500 on Disrupt 2026 tickets

    April 9, 2026

    British cryptologist Adam Back denies NYT report that he is Bitcoin founder Satoshi Nakamoto

    April 8, 2026

    4 days left to save nearly $500 on Disrupt 2026 passes

    April 7, 2026

    Google paid startup Form Energy $1 billion for a high-capacity battery that lasts 100 hours.

    February 26, 2026

    Welcome to the post-hype crypto market

    February 25, 2026
  • Security

    Europol sends email to 75,000 people asking them to stop DDoS attack

    April 16, 2026

    It's not just you — Blue Sky is (kinda) depressed

    April 16, 2026

    Two Americans convicted of aiding North Korea in stealing $5 million in fake IT worker scheme

    April 16, 2026

    Fashion retailer Express left customers' personal data and order details exposed on the internet

    April 16, 2026

    Sweden accuses Russian hackers of attempting 'destructive' cyber attack on thermal power plant

    April 15, 2026
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Report states that high-end AI is in procurement negotiations at a valuation of $2 billion

    April 16, 2026

    Accelerator raises $5 billion to support late-game bets

    April 15, 2026

    Anthropic is currently valued at more than $800 billion and is ignoring funding offers from VCs.

    April 15, 2026

    Financial risk management platform Pillar raises $20 million in seed round led by a16z

    April 14, 2026

    StrictlyVC San Francisco is less than a month away

    April 14, 2026
TechBrunchTechBrunch

A US military contractor may have developed an iPhone hacking tool used by Russian spies in Ukraine

TechBrunchBy TechBrunchMarch 10, 20268 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


A massive hacking campaign targeting iPhone users in Ukraine and China used tools likely designed by US military contractor L3Harris, a TechCrunch investigation found. The tool was intended for Western spies, but ended up in the hands of various hacking groups, including Russian government spies and Chinese cybercriminals.

Last week, Google revealed that it discovered that an advanced iPhone hacking toolkit had been used in a series of global attacks dating back to 2025. The toolkit, named “Coruna” by its original developer, consisted of 23 different components that were initially used “in highly targeted operations” by an anonymous government customer of an unspecified “surveillance vendor.” It was then used by Russian government spies against a limited number of Ukrainians, and finally by Chinese cybercriminals in a “large scale” campaign aimed at stealing money and cryptocurrencies.

Researchers at mobile cybersecurity firm iVerify, who conducted an independent analysis of Coruna, said they believe Coruna may have been built by a company that originally sold it to the U.S. government.

Two former employees of government contractor L3Harris told TechCrunch that Coruna was developed, at least in part, by the company's hacking and surveillance technology division, Trenchant. Both former employees had knowledge of the company's iPhone hacking tools. The people spoke on condition of anonymity because they were not authorized to discuss their work at the company.

“Coruna was definitely the internal name of the component,” said one former L3Harris employee who was familiar with iPhone hacking tools as part of his work at Trenchant.

“If you look at the technical details, a lot of it is well known,” the person said of some of the evidence Google released.

Contact Us Want more information about Coruna or other government hacking and spyware tools? You can contact Lorenzo Franceschi-Bicchierai securely from your non-work device on Signal (+1 917 257 1382) or on Telegram, Keybase and Wire @lorenzofb, or by email.

Former employees said the comprehensive Trenchant toolkit includes several different components, including Coruna and related exploits. Another former employee acknowledged that some of the details included in the published hacking toolkit came from Trenchant.

L3Harris sells Torrent's hacking and surveillance tools exclusively to the U.S. government and its allies in the so-called Five Eyes intelligence alliance, which includes Australia, Canada, New Zealand, and the United Kingdom. Given Trenchant's limited number of customers, it is possible that Coruna was originally acquired and used by one of these government intelligence agencies and then fell into unintended hands, but it is unclear how much of the publicly available Coruna hacking toolkit was developed by L3Harris Trenchant.

A spokesperson for L3Harris did not respond to a request for comment.

It is unclear how Koruna passed from the hands of Five Eyes government contractors to a Russian government hacking group and then to a Chinese cybercriminal organization.

But parts of the situation seem similar to the case of former Trenchant general manager Peter Williams. From 2022 until he resigned in mid-2025, Williams sold eight companies' hacking tools to Operation Zero. This is a Russian company offering millions of dollars in exchange for zero-day exploits, which means unknown vulnerabilities for affected vendors.

Williams, a 39-year-old Australian national, was sentenced to seven years in prison last month after admitting stealing eight Trenchint hacking tools and selling them to Operation Zero for $1.3 million.

The US government said Williams used his “complete access” to Trentint's network to “betray” the United States and its allies. Prosecutors have accused him of leaking tools that could have given those who used them “potential access to millions of computers and devices around the world,” suggesting the tools exploited vulnerabilities affecting widely used software such as iOS.

Operation Zero, authorized by the US government last month, claims to work only with the Russian government and local companies. The US Treasury claimed that a Russian broker sold Williams' “stolen tools to at least one unauthorized user.”

That would explain how a Russian spy group, identified only by Google as UNC6353, obtained Coruna, deployed it to compromised Ukrainian websites, and hacked certain iPhone users from their specific locations where they unwittingly visited the malicious site.

Operation Zero may have acquired Coruna and sold it to the Russian government, but the broker may have resold the toolkit to someone else, perhaps another broker, another country, or even cybercriminals directly. The Treasury Department alleged that members of the Trickbot ransomware gang collaborated with Operation Zero, linking brokers to financially motivated hackers.

At that point, Coruna may have passed into other hands before reaching Chinese hackers. U.S. prosecutors said Williams realized that the code he had written and sold to Operation Zero was later used by a Korean broker.

Next to the L3Harris logo is the logo created by Kaspersky for Operation Triangulation. Image credits: Kaspersky and L3Harris

triangulation operation

Google researchers wrote Tuesday that two specific Coruna exploits and underlying vulnerabilities, called Photon and Gallium by their original developers, were used as zero-days in Operation Triangulation, a sophisticated hacking campaign allegedly used against Russian iPhone users. Operation Triangulation was first revealed by Kaspersky in 2023.

iVerify co-founder Rocky Cole told TechCrunch that “the best explanation based on what we know at this point” points to Trentint and the U.S. government as Coruna's original developers and customers. However, Cole added that he was not making this claim “categorically.”

He said the evaluation is based on three factors. The timeline of Coruña's use matches Williams' leak. The structure of the three modules in Coruna (plasma, photon, and gallium) is very similar to triangulation. Coruna then reused some of the same exploits used in that operation.

Cole said “people close to the defense community” claim the plasma was used in a triangulation operation, but “there is no public evidence of that.” (Cole previously worked for the U.S. National Security Agency.)

According to Google and iVerify, Coruna was designed to hack iPhone models running iOS 13 to 17.2.1 released between September 2019 and December 2023. These dates align with the timeline of some of Williams' leaks and the discovery of Operation Triangulation.

One former Trenchant employee told TechCrunch that when Triangulation first came to light in 2023, other employees at the company believed that at least one of the zero-days captured by Kaspersky Lab “came from our company and could have been 'stolen' from an overarching project that included Coruna.”

As security researcher Costin Raiu pointed out, another breadcrumb pointing to Trenchant is the use of bird names for some of its 23 tools, including Cassowary, Terrorbird, Bluebird, Jacultu, and Sparrow. In 2021, the Washington Post revealed that Azimuth, one of two startups later acquired by L3Harris and merged with Trenchant, sold a hacking tool called Condor to the FBI in the infamous San Bernardino iPhone cracking scandal.

After Kaspersky published its findings on the triangulation operation, Russia's Federal Security Service (FSB) accused the NSA of hacking “thousands” of iPhones in Russia, specifically targeting diplomats. A Kaspersky spokesperson said at the time that the company had no information about the FSB's allegations. A spokesperson said the “indications of compromise” (meaning evidence of hacking) identified by Russia's National Computer Incident Coordination Center (NCCCI) were the same as those identified by Kaspersky Lab.

Boris Larin, a security researcher at Kaspersky Lab, told TechCrunch in an email: [Advanced Persistent Threat] group or exploit development company. ”

Larin explained that Google linked Coruna to Operation Triangulation because they both exploit the same two vulnerabilities: Photon and Gallium.

“Attribution cannot be based solely on the fact that these vulnerabilities were exploited. All details of both vulnerabilities have been public for a long time, so anyone could have exploited them,” he said, adding that these two common vulnerabilities are “just the tip of the iceberg.”

Kaspersky has never publicly accused the US government of being behind the triangulation operation. Interestingly, the logo the company created for the campaign (an apple logo made up of several triangles) is reminiscent of the L3Harris logo. That may not be a coincidence. Kaspersky has previously said it does not publicize its hacking operations, but has quietly suggested that it actually knows who was behind it and who provided the tools.

In 2014, Kaspersky announced that it had captured a sophisticated and elusive government hacking group known as “Careto” (Spanish for “mask”). The company said only that the hackers spoke Spanish. However, the mask illustrations the company used in its report included the red and yellow of the Spanish flag, bull horns and a nose ring, and castanets.

As TechCrunch revealed last year, Kaspersky researchers privately concluded that there was “no doubt” that Careto was run by the Spanish government, as one of the researchers put it.

On Wednesday, cybersecurity journalist Patrick Gray said on an episode of his podcast “Risky Business” that he believed, based on “pieces and pieces” of which he was confident, that what Williams leaked to Operation Zero was the hacking kit used in the triangulation operation.

Apple, Google and Operation Zero did not respond to requests for comment.

This post was originally published at 6:56 PM PT



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Europol sends email to 75,000 people asking them to stop DDoS attack

April 16, 2026

It's not just you — Blue Sky is (kinda) depressed

April 16, 2026

Two Americans convicted of aiding North Korea in stealing $5 million in fake IT worker scheme

April 16, 2026

Fashion retailer Express left customers' personal data and order details exposed on the internet

April 16, 2026

Sweden accuses Russian hackers of attempting 'destructive' cyber attack on thermal power plant

April 15, 2026

Someone has put a backdoor into dozens of WordPress plugins used by thousands of websites.

April 14, 2026

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Report states that high-end AI is in procurement negotiations at a valuation of $2 billion

April 16, 2026

Europol sends email to 75,000 people asking them to stop DDoS attack

April 16, 2026

It's not just you — Blue Sky is (kinda) depressed

April 16, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2026 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.