{"id":64875,"date":"2026-03-04T04:34:12","date_gmt":"2026-03-04T03:34:12","guid":{"rendered":"https:\/\/www.apfelpatient.de\/?p=64875"},"modified":"2026-03-04T04:39:13","modified_gmt":"2026-03-04T03:39:13","slug":"iphone-security-dangerous-exploit-toolkit-in-circulation","status":"publish","type":"post","link":"https:\/\/www.apfelpatient.de\/en\/news\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf","title":{"rendered":"iPhone Security: Dangerous exploit toolkit in circulation"},"content":{"rendered":"<p class=\"has-drop-cap\"><strong>The iPhone is considered one of the most secure smartphones on the market. Apple places great emphasis on data protection, encryption, and regular security updates. Nevertheless, new attack techniques constantly emerge that attempt to exploit vulnerabilities in the system.<\/strong><\/p>\n\n\n\n<p>A toolkit called Coruna is currently attracting attention in the IT security industry. This toolkit exploits a number of vulnerabilities in older iOS versions and can, under certain circumstances, spread via compromised websites. The fact that the tool is now circulating in criminal circles is particularly problematic.<\/p>\n\n\n\n<p>The analyses also show indications that the toolkit may have originally come from a government environment and was later resold on the black market.<\/p>\n\n\n\n<p class=\"translation-block\">The information on this topic comes from a report by the US magazine <a href=\"https:\/\/www.wired.com\/story\/coruna-iphone-hacking-toolkit-us-government\/\" id=\"https:\/\/www.wired.com\/story\/coruna-iphone-hacking-toolkit-us-government\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-wpel-link=\"external\">Wired<\/a>. The article is based on technical analyses by the <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/coruna-powerful-ios-exploit-kit?hl=en\" id=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/coruna-powerful-ios-exploit-kit?hl=en\" target=\"_blank\" rel=\"noreferrer noopener\" data-wpel-link=\"external\">Google Threat Intelligence Group<\/a> and the security firm <a href=\"https:\/\/iverify.io\/press-releases\/first-known-mass-ios-attack\" id=\"https:\/\/iverify.io\/press-releases\/first-known-mass-ios-attack\" target=\"_blank\" rel=\"noreferrer noopener\" data-wpel-link=\"external\">iVerify<\/a>.<\/p>\n\n\n\n<p>Google investigated the technical functionality of the exploit toolkit and its distribution. iVerify additionally analyzed the tool&#039;s code and found clues to possible origins and development patterns.<\/p>\n\n\n\n<p>According to the researchers involved, Coruna is a particularly complex attack tool capable of exploiting multiple vulnerabilities simultaneously. It now appears to be widespread in the cybercrime scene and has already been used in various attacks.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-das-coruna-toolkit-aufbau-und-funktionsweise\">The Coruna Toolkit: Structure and Functionality<\/h4>\n\n\n\n<p>The Coruna toolkit is an exploit system with five different attack techniques that exploits a total of 23 security vulnerabilities in iOS.<\/p>\n\n\n\n<p>These vulnerabilities primarily affect older versions of the operating system. An attack can potentially be triggered simply by a user with a vulnerable iPhone visiting a compromised website.<\/p>\n\n\n\n<p>The toolkit focuses primarily on vulnerabilities in WebKit. WebKit is Apple&#039;s browser engine and a core component of Safari, as well as many other functions in the iPhone system.<\/p>\n\n\n\n<p>By exploiting these vulnerabilities, attackers can gain access to the device and subsequently install further malware or read data.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-betroffene-ios-versionen-und-iphone-gerate\">Affected iOS versions and iPhone devices<\/h4>\n\n\n\n<p>According to available analyses, the Coruna toolkit affects iPhones with iOS versions between iOS 13 and iOS 17.2.1. These versions cover a period of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>September 2019 (iOS 13)<\/li>\n\n\n\n<li>until December 2023 (iOS 17.2.1)<\/li>\n<\/ul>\n\n\n\n<p>Devices with these versions may be vulnerable to attack by the toolkit under certain circumstances.<\/p>\n\n\n\n<p>However, Apple has taken security measures. In addition to previous security updates that already closed individual vulnerabilities, the toolkit was specifically neutralized with iOS 26.<\/p>\n\n\n\n<p class=\"translation-block\">According to <a href=\"https:\/\/www.apfelpatient.de\/en\/news\/apple-shows-the-rollout-of-ios-26-and-ipados-26\" id=\"https:\/\/www.apfelpatient.de\/news\/apple-zeigt-verbreitung-von-ios-26-und-ipados-26\" data-wpel-link=\"internal\" target=\"_self\">current<\/a> figures, 74 percent of iPhones that support iOS 26 had already installed the update by February 12th.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-schutzmassnahmen-fur-iphone-nutzer\">Protective measures for iPhone users<\/h4>\n\n\n\n<p>The most important measure for protection against Coruna is an up-to-date operating system. iPhone users should ensure their device is updated to the latest available iOS version.<\/p>\n\n\n\n<p>According to Apple, the update to iOS 26 prevents known exploits from the toolkit from working. Furthermore, iOS includes a special security mode called Lockdown Mode.<\/p>\n\n\n\n<p>This mode is particularly restrictive and limits various functions to prevent targeted cyberattacks. The Coruna Toolkit actively checks whether this mode is enabled. If lockdown mode is activated, the toolkit will not execute an attack.<\/p>\n\n\n\n<p class=\"translation-block\">However, <a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/blocking-mode-for-maximum-security-for-iphone-ipad-and-mac\" id=\"https:\/\/www.apfelpatient.de\/tipps-tricks\/blockierungsmodus-maximale-sicherheit-fuer-iphone-ipad-und-mac\" data-wpel-link=\"internal\" target=\"_self\">Lockdown Mode<\/a> is not intended for regular users. It was specifically designed for individuals who are at increased risk of targeted cyberattacks, such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Government members<\/li>\n\n\n\n<li>Journalists<\/li>\n\n\n\n<li>Activists<\/li>\n\n\n\n<li>other publicly exposed persons<\/li>\n<\/ul>\n\n\n\n<p>For most iPhone users, a current system update is sufficient to be protected.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-hinweise-auf-eine-mogliche-herkunft-aus-der-us-regierung\">Indications of a possible origin from the US government<\/h4>\n\n\n\n<p>iVerify&#039;s findings regarding the possible origin of the tool are particularly interesting.<\/p>\n\n\n\n<p>Security researchers suspect that Coruna was originally developed on behalf of the US government. This assessment is based on several technical clues:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Similar frameworks to those used in other well-known government exploit tools<\/li>\n\n\n\n<li>A very high level of technological development<\/li>\n\n\n\n<li>English comments in the program code<\/li>\n<\/ul>\n\n\n\n<p>Rocky Cole, co-founder of iVerify, explained that the toolkit had been developed with great care.<\/p>\n\n\n\n<p>In his estimation, the development cost several million dollars and exhibits typical characteristics of modules that have already been publicly attributed to the US government.<\/p>\n\n\n\n<p>Cole also described Coruna as one of the first known examples of such a state tool apparently getting out of control.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-verbreitung-uber-den-schwarzmarkt\">Distribution via the black market<\/h4>\n\n\n\n<p>The analyses suggest that the toolkit eventually escaped its original environment. According to these findings, the US government may have lost control of the tool through a series of events. Subsequently, the toolkit is believed to have been sold on the black market for several million dollars.<\/p>\n\n\n\n<p>The buyer of the tool apparently tried to recoup the purchase price. To this end, a modified version of the toolkit was resold. Through these resales, Coruna spread increasingly among cybercriminals.<\/p>\n\n\n\n<p>Today, various versions of the toolkit exist, each adapted for different purposes. In some cases, less sophisticated malware was added to the original code.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-bereits-bekannte-angriffe-mit-coruna\">Previously known attacks with Coruna<\/h4>\n\n\n\n<p>The security firm iVerify estimates that approximately 42,000 devices have already been compromised with a specific version of the toolkit. This variant was used in a Chinese-language cyberattack.<\/p>\n\n\n\n<p>Furthermore, according to the analysis, the tool was used in a Russian espionage operation. This operation was allegedly directed against an unknown number of people in Ukraine.<\/p>\n\n\n\n<p>These cases show that the toolkit no longer exists only theoretically, but has already been actively used in real attacks.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-alternative-theorie-zur-herkunft\">Alternative theory on origin<\/h4>\n\n\n\n<p>In his analysis, Rocky Cole also mentioned an alternative theory regarding the origin of Coruna. According to this theory, the toolkit could have been assembled from various components of the so-called Operation Triangulation. Russia had previously attributed this operation to US hackers.<\/p>\n\n\n\n<p>However, after closer analysis, iVerify considers this theory unlikely.<\/p>\n\n\n\n<p>The developers of Coruna have created a very unified and technically sophisticated system. This suggests that it is a large-scale project with a substantial budget, and not a collection of individual, assembled modules.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/generally\/apples-privacy-policy-why-no-competitor-can-keep-up\">Apple Privacy Policy: Why no competitor can keep up<\/a><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-iphone-sicherheit-warum-regelmassige-updates-entscheidend-sind\">iPhone security: Why regular updates are crucial<\/h3>\n\n\n\n<p>The Coruna case demonstrates the risks that can arise when sophisticated hacking tools exist. Even if such tools were originally developed for government investigations or intelligence operations, there is always the possibility that they could fall into the wrong hands.<\/p>\n\n\n\n<p>Apple has repeatedly resisted government demands to build backdoors into iPhone encryption. Such backdoors could pose a long-term security risk, as they could be misused or stolen.<\/p>\n\n\n\n<p>The current situation underscores once again how important regular updates are for the iPhone. As long as devices are kept up to date, many known exploits remain ineffective and the system&#039;s security level remains high. (Image: Shutterstock \/ Pungu x)<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/m4-ipad-air-first-geekbench-results-have-appeared\" type=\"link\" id=\"https:\/\/www.apfelpatient.de\/news\/m4-ipad-air-erste-geekbench-ergebnisse-sind-aufgetaucht\">M4 iPad Air: First Geekbench results have surfaced<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/studio-display-xdr-supports-dicom-medical-images\">Studio Display XDR supports DICOM medical images<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/apple-is-promoting-mac-gaming-at-gdc-2026\">Apple is promoting Mac gaming at GDC 2026<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/studio-display-xdr-120hz-only-compatible-with-certain-macs\">Studio Display XDR: 120 Hz only with certain Macs<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/studio-display-studio-display-xdr-without-intel-support\">Studio Display &amp; Studio Display XDR without Intel support<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/openai-gpt-5-3-ensures-better-dialogue\">OpenAI: GPT-5.3 enables better dialogue<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/meta-ray-ban-privacy-nightmare-revealed\">Meta Ray-Ban: Data privacy nightmare revealed<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/the-pro-display-xdr-is-being-discontinued\">The Pro Display XDR is being discontinued<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/macbook-air-m5-what-the-new-generation-brings\">MacBook Air M5: What the new generation brings<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/macbook-pro-with-m5-pro-and-m5-max-officially-unveiled\">MacBook Pro with M5 Pro &amp; M5 Max officially unveiled<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/apple-m5-pro-and-m5-max-more-power-for-professionals\">Apple M5 Pro and M5 Max: More power for professionals<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/apple-presents-studio-display-studio-display-xdr\">Apple presents Studio Display &amp; Studio Display XDR<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/apple-tv-will-not-be-getting-a-third-season-of-palm-royale\">Apple TV: No third season for Palm Royale<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/anthropic-facilitates-ai-migration-with-import-tool\">Anthropic simplifies AI migration with import tool<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/where-is-the-file-located-offline-files-knows-the-answer-immediately\">Where is the file located? Offline Files knows the answer instantly<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/ios-26-4-beta-3-is-here-the-next-step-towards-release\">iOS 26.4 Beta 3 is here: Next step towards release<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/paramount-plans-mega-streaming-service-with-hbo\">Paramount plans mega streaming service with HBO<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/apple-unveils-new-accessories-for-spring-2026\">Apple unveils new accessories for spring 2026<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/will-an-iphone-16e-case-also-fit-the-iphone-17e\">Will an iPhone 16e case also fit the iPhone 17e?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/ipad-air-with-m4-is-here-thats-what-the-update-offers\">iPad Air with M4 is here: Here&#039;s what the update offers<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/the-iphone-17e-is-here-heres-whats-in-the-new-model\">The iPhone 17e is here: Here&#039;s what&#039;s inside the new model<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/apple-tv-impresses-at-international-award-ceremonies\">Apple TV impresses at international award ceremonies<\/a><\/li>\n<\/ul>\n\n\n\n<h6 class=\"wp-block-heading translation-block\" id=\"h-kennt-ihr-schon-unsere-amazon-storefront-dort-findet-ihr-eine-handverlesene-auswahl-von-diversen-produkten-f-r-euer-iphone-und-co-viel-spa-beim-st-bern\"><em>Have you already visited our Amazon Storefront? There you&#039;ll find a hand-picked selection of various products for your iPhone and other devices \u2013 <span class=\"has-inline-color has-vivid-red-color\"><a href=\"https:\/\/www.amazon.de\/shop\/apfelpatientofficial\" class=\"ek-link\" data-wpel-link=\"exclude\" rel=\"follow noopener\" target=\"_self\"><span style=\"text-decoration: underline\" class=\"ek-underline\">enjoy browsing<\/span><\/a> !<\/span><\/em><\/h6>\n\n\n\n<h6 class=\"wp-block-heading translation-block\" id=\"h-der-beitrag-enthalt-partnerlinks\">This post contains <a data-type=\"URL\" data-id=\"https:\/\/www.apfelpatient.de\/partnerprogramm\" href=\"https:\/\/www.apfelpatient.de\/en\/partner-program\" data-wpel-link=\"internal\" target=\"_self\">affiliate links<\/a>.<\/h6>","protected":false},"excerpt":{"rendered":"<p>iPhone security in focus: Coruna exploits 23 iOS vulnerabilities and spreads underground. Why updates are especially important now.<\/p>","protected":false},"author":2,"featured_media":64874,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jnews-multi-image_gallery":[],"jnews_single_post":{"format":"standard","override":[{"template":"2","parallax":"1","fullscreen":"1","layout":"right-sidebar","sidebar":"default-sidebar","second_sidebar":"default-sidebar","sticky_sidebar":"1","share_position":"top","share_float_style":"share-monocrhome","show_featured":"1","show_post_meta":"1","show_post_author":"1","show_post_author_image":"1","show_post_date":"1","post_date_format":"default","post_date_format_custom":"Y\/m\/d","show_post_reading_time":"0","post_reading_time_wpm":"300","post_calculate_word_method":"str_word_count","show_zoom_button":"0","zoom_button_out_step":"2","zoom_button_in_step":"3","show_post_tag":"1","show_prev_next_post":"1","show_popup_post":"1","show_comment_section":"1","number_popup_post":"1","show_author_box":"0","show_post_related":"0","show_inline_post_related":"0"}],"image_override":[{"single_post_thumbnail_size":"crop-500","single_post_gallery_size":"crop-500"}],"trending_post_position":"meta","trending_post_label":"Trending","sponsored_post_label":"Sponsored by","disable_ad":"0"},"jnews_primary_category":{"id":"9"},"footnotes":""},"categories":[9],"tags":[3,8,13],"class_list":["post-64875","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-ios","tag-iphone","tag-techpatient"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>iPhone-Sicherheit: Gef\u00e4hrliches Exploit-Toolkit im Umlauf Apfelpatient<\/title>\n<meta name=\"description\" content=\"iPhone-Sicherheit im Fokus: Coruna nutzt 23 iOS-L\u00fccken und verbreitet sich im Untergrund. Warum Updates jetzt besonders wichtig sind.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apfelpatient.de\/en\/news\/iphone-security-dangerous-exploit-toolkit-in-circulation\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"iPhone-Sicherheit: Gef\u00e4hrliches Exploit-Toolkit im Umlauf\" \/>\n<meta property=\"og:description\" content=\"iPhone-Sicherheit im Fokus: Coruna nutzt 23 iOS-L\u00fccken und verbreitet sich im Untergrund. Warum Updates jetzt besonders wichtig sind.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apfelpatient.de\/en\/news\/iphone-security-dangerous-exploit-toolkit-in-circulation\" \/>\n<meta property=\"og:site_name\" content=\"Apfelpatient\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apfelpatientOfficial\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/apfelpatientOfficial\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-04T03:34:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-04T03:39:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2026\/03\/shutterstock_2414197855.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1066\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Milan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"iPhone-Sicherheit im Fokus: Coruna nutzt 23 iOS-L\u00fccken und verbreitet sich im Untergrund. Warum Updates jetzt besonders wichtig sind.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Milan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf\"},\"author\":{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/#organization\",\"name\":\"Apfelpatient\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/\"},\"headline\":\"iPhone-Sicherheit: Gef\u00e4hrliches Exploit-Toolkit im Umlauf\",\"datePublished\":\"2026-03-04T03:34:12+00:00\",\"dateModified\":\"2026-03-04T03:39:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf\"},\"wordCount\":1279,\"publisher\":{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/#organization\",\"name\":\"Apfelpatient\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apfelpatient.de\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/shutterstock_2414197855.jpg\",\"keywords\":[\"iOS\",\"iPhone\",\"TechPatient\"],\"articleSection\":\"News\",\"inLanguage\":\"en-US\",\"copyrightYear\":\"2026\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf\",\"name\":\"iPhone-Sicherheit: Gef\u00e4hrliches Exploit-Toolkit im Umlauf Apfelpatient\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apfelpatient.de\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/shutterstock_2414197855.jpg\",\"datePublished\":\"2026-03-04T03:34:12+00:00\",\"dateModified\":\"2026-03-04T03:39:13+00:00\",\"description\":\"iPhone-Sicherheit im Fokus: Coruna nutzt 23 iOS-L\u00fccken und verbreitet sich im Untergrund. Warum Updates jetzt besonders wichtig sind.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf#primaryimage\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/shutterstock_2414197855.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apfelpatient.de\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/shutterstock_2414197855.jpg\",\"width\":1600,\"height\":1066,\"caption\":\"Bild: Shutterstock \\\/ Pungu x\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.apfelpatient.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"iPhone-Sicherheit: Gef\u00e4hrliches Exploit-Toolkit im Umlauf\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/#website\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/\",\"name\":\"Apfelpatient\",\"description\":\"Alles rund um Apple!\",\"publisher\":{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/#organization\",\"name\":\"Apfelpatient\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/\"},\"alternateName\":\"Apfelpatient\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apfelpatient.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/#\\\/schema\\\/person\\\/42c7891440704b11b0b6bba927ebf52c\",\"name\":\"Milan\",\"logo\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/#\\\/schema\\\/person\\\/image\\\/\"},\"description\":\"Hallo und herzlich willkommen auf meinem Technik-Blog! Als gro\u00dfer Apple-Fan berichte ich hier \u00fcber alles, was mit Apple zu tun hat: von den neuesten News und spannenden Ger\u00fcchten \u00fcber hilfreiche Tipps und Tricks bis hin zu ausf\u00fchrlichen Produkttests. Wenn du genauso technikbegeistert bist wie ich, bist du hier genau richtig!\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apfelpatientOfficial\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/milan-jovicic-42aa0231b\"],\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/author\\\/apfeladmin\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"iPhone security: Dangerous exploit toolkit in circulation Apfelpatient","description":"iPhone security in focus: Coruna exploits 23 iOS vulnerabilities and spreads underground. Why updates are especially important now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apfelpatient.de\/en\/news\/iphone-security-dangerous-exploit-toolkit-in-circulation","og_locale":"en_US","og_type":"article","og_title":"iPhone-Sicherheit: Gef\u00e4hrliches Exploit-Toolkit im Umlauf","og_description":"iPhone-Sicherheit im Fokus: Coruna nutzt 23 iOS-L\u00fccken und verbreitet sich im Untergrund. Warum Updates jetzt besonders wichtig sind.","og_url":"https:\/\/www.apfelpatient.de\/en\/news\/iphone-security-dangerous-exploit-toolkit-in-circulation","og_site_name":"Apfelpatient","article_publisher":"https:\/\/www.facebook.com\/apfelpatientOfficial","article_author":"https:\/\/www.facebook.com\/apfelpatientOfficial","article_published_time":"2026-03-04T03:34:12+00:00","article_modified_time":"2026-03-04T03:39:13+00:00","og_image":[{"width":1600,"height":1066,"url":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2026\/03\/shutterstock_2414197855.jpg","type":"image\/jpeg"}],"author":"Milan","twitter_card":"summary_large_image","twitter_description":"iPhone-Sicherheit im Fokus: Coruna nutzt 23 iOS-L\u00fccken und verbreitet sich im Untergrund. Warum Updates jetzt besonders wichtig sind.","twitter_misc":{"Written by":"Milan","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.apfelpatient.de\/news\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf#article","isPartOf":{"@id":"https:\/\/www.apfelpatient.de\/news\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf"},"author":{"@type":"Organization","@id":"https:\/\/www.apfelpatient.de\/en\/#organization","name":"Apfelpatient","url":"https:\/\/www.apfelpatient.de\/en\/"},"headline":"iPhone-Sicherheit: Gef\u00e4hrliches Exploit-Toolkit im Umlauf","datePublished":"2026-03-04T03:34:12+00:00","dateModified":"2026-03-04T03:39:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apfelpatient.de\/news\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf"},"wordCount":1279,"publisher":{"@type":"Organization","@id":"https:\/\/www.apfelpatient.de\/en\/#organization","name":"Apfelpatient","url":"https:\/\/www.apfelpatient.de\/en\/"},"image":{"@id":"https:\/\/www.apfelpatient.de\/news\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf#primaryimage"},"thumbnailUrl":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2026\/03\/shutterstock_2414197855.jpg","keywords":["iOS","iPhone","TechPatient"],"articleSection":"News","inLanguage":"en-US","copyrightYear":"2026","copyrightHolder":{"@id":"https:\/\/www.apfelpatient.de\/en\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.apfelpatient.de\/news\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf","url":"https:\/\/www.apfelpatient.de\/news\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf","name":"iPhone security: Dangerous exploit toolkit in circulation Apfelpatient","isPartOf":{"@id":"https:\/\/www.apfelpatient.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apfelpatient.de\/news\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf#primaryimage"},"image":{"@id":"https:\/\/www.apfelpatient.de\/news\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf#primaryimage"},"thumbnailUrl":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2026\/03\/shutterstock_2414197855.jpg","datePublished":"2026-03-04T03:34:12+00:00","dateModified":"2026-03-04T03:39:13+00:00","description":"iPhone security in focus: Coruna exploits 23 iOS vulnerabilities and spreads underground. Why updates are especially important now.","breadcrumb":{"@id":"https:\/\/www.apfelpatient.de\/news\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apfelpatient.de\/news\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apfelpatient.de\/news\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf#primaryimage","url":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2026\/03\/shutterstock_2414197855.jpg","contentUrl":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2026\/03\/shutterstock_2414197855.jpg","width":1600,"height":1066,"caption":"Bild: Shutterstock \/ Pungu x"},{"@type":"BreadcrumbList","@id":"https:\/\/www.apfelpatient.de\/news\/iphone-sicherheit-gefaehrliches-exploit-toolkit-im-umlauf#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.apfelpatient.de\/"},{"@type":"ListItem","position":2,"name":"iPhone-Sicherheit: Gef\u00e4hrliches Exploit-Toolkit im Umlauf"}]},{"@type":"WebSite","@id":"https:\/\/www.apfelpatient.de\/#website","url":"https:\/\/www.apfelpatient.de\/","name":"apple patient","description":"Everything about Apple!","publisher":{"@type":"Organization","@id":"https:\/\/www.apfelpatient.de\/en\/#organization","name":"Apfelpatient","url":"https:\/\/www.apfelpatient.de\/en\/"},"alternateName":"Apfelpatient","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apfelpatient.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.apfelpatient.de\/#\/schema\/person\/42c7891440704b11b0b6bba927ebf52c","name":"Milan","logo":{"@id":"https:\/\/www.apfelpatient.de\/#\/schema\/person\/image\/"},"description":"Hello and welcome to my technology blog! As a big Apple fan, I report on everything to do with Apple: from the latest news and exciting rumors to helpful tips and tricks and detailed product tests. If you are as enthusiastic about technology as I am, you have come to the right place!","sameAs":["https:\/\/www.facebook.com\/apfelpatientOfficial","https:\/\/www.linkedin.com\/in\/milan-jovicic-42aa0231b"],"url":"https:\/\/www.apfelpatient.de\/en\/author\/apfeladmin"}]}},"_links":{"self":[{"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/posts\/64875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/comments?post=64875"}],"version-history":[{"count":2,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/posts\/64875\/revisions"}],"predecessor-version":[{"id":64877,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/posts\/64875\/revisions\/64877"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/media\/64874"}],"wp:attachment":[{"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/media?parent=64875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/categories?post=64875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/tags?post=64875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}