An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor

An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor

AI & ML·2 min read·via TechCrunchOriginal source →

Takeaways

  • A sophisticated iPhone-hacking toolkit, likely developed by U.S. contractor L3Harris, has been used in global cyberattacks.
  • The toolkit, known as "Coruna," was originally designed for Western intelligence but ended up in the hands of Russian and Chinese hackers.
  • The situation raises serious concerns about the security of government-developed hacking tools and their potential misuse.

U.S. Military Contractor's Hacking Tools Allegedly Used by Russian and Chinese Cybercriminals

The Rise of Coruna

In a startling revelation, it has been reported that a hacking toolkit originally designed for Western intelligence agencies has been repurposed by Russian and Chinese cybercriminals. The toolkit, dubbed "Coruna," comprises 23 components and was first employed in targeted operations by a government customer of an unnamed surveillance vendor. Google disclosed that the toolkit was used in a series of global attacks throughout 2025, primarily targeting iPhone users in Ukraine and China. This shift from a tool meant for espionage to one used for widespread cybercrime raises eyebrows and questions regarding the security protocols surrounding sensitive technological developments.

The Role of L3Harris

The origins of Coruna appear to trace back to L3Harris, a U.S. military contractor. Two former employees from L3Harris's Trenchant division confirmed that Coruna was indeed an internal name for some of the components. Trenchant specializes in hacking and surveillance technologies, selling its tools exclusively to the U.S. government and its allies in the Five Eyes intelligence alliance. This limited clientele raises concerns about how such sensitive tools could fall into the hands of adversarial nations. The implications for cybersecurity practitioners are significant; the potential for government-developed tools to be misappropriated underscores the need for stringent oversight and security measures.

A Troubling Chain of Events

The transition of Coruna from a U.S. government contractor to Russian and Chinese hackers is shrouded in uncertainty. However, parallels can be drawn to the case of Peter Williams, a former Trenchant manager who sold hacking tools to a Russian company for $1.3 million. Williams's actions, which led to a seven-year prison sentence, exemplify the vulnerabilities within government contractor networks. If tools like Coruna can be leaked or sold, what does that mean for the integrity of national security? For engineers and cybersecurity experts, this incident serves as a cautionary tale about the importance of safeguarding sensitive technologies and the potential ramifications of their misuse.

Implications for Cybersecurity

As the tech community grapples with the fallout from this incident, the focus will likely shift toward improving security protocols for government-developed hacking tools. The fact that such tools can be weaponized against the very nations that developed them poses a unique challenge for cybersecurity practitioners. It raises critical questions about ethical hacking, the responsibilities of contractors, and the need for robust oversight mechanisms. As the landscape of cyber warfare evolves, staying ahead of adversaries who may exploit these vulnerabilities will be paramount for engineers and security professionals alike.

More Stories