DarkSword spyware puts 270 million iPhones at risk, researchers warn

iphones spyware 1 2026 03 ceb624376121bf7a106d0504550871fc
A newly identified spyware tool called DarkSword could put hundreds of millions of iPhones at risk if devices are not updated. The tool has already been used in targeted attacks across multiple countries.

The findings come from a joint investigation involving Google’s threat intelligence team, alongside cybersecurity firms Lookout and iVerify. Their reports point to a coordinated effort using advanced exploit methods, some linked to state-backed actors.

What is DarkSword spyware?
DarkSword is what researchers describe as an exploit chain — not a single bug, but a sequence of vulnerabilities. It combines multiple software weaknesses to gain access to a device and move deeper into system controls. Google said the tool uses six vulnerabilities together to fully compromise certain iPhones.

How the DarkSword attack works

The entry point is often Safari. McCoy told TIME that a user may only need to click a link — what researchers call a drive-by download — for the attack to begin. According to iVerify, two compromised domains were identified, including a .gov.ua domain: novosti.dn[.]ua and 7aac.gov[.]ua.

From there, access expands rapidly. Data can be extracted within seconds, after which the tool removes traces of its activity and exits.

What data DarkSword spyware can access on iPhones

The scope is extensive, given that it is a surveillance-focused tool. According to iVerify, it can extract:

  • Wi-Fi credentials
  • Messages
  • Call logs
  • Location history
  • Browser data
  • SIM and cellular details
  • Health and Notes data

Cryptocurrency wallets may also be targeted.

Countries where DarkSword iPhone attacks have been detected

Researchers observed activity in Ukraine, China, Saudi Arabia, Turkey, and Malaysia.

In one case, a Ukrainian government-linked domain appeared to have been compromised. Another attack used a website mimicking Snapchat to target users. No confirmed cases involving US users were reported in the findings.

Who may be behind the DarkSword attacks

The tool has reportedly been in use since at least November 2025. Google linked its use to commercial surveillance vendors and suspected state-backed groups.

Which iPhones are vulnerable to DarkSword attacks

Devices running iOS 18.4 to 18.7 are considered at risk. iVerify estimates this could affect around 270 million devices globally.

“This is a pretty significant threat,” Damon McCoy of New York University told TIME, pointing to users still running older iOS versions.

Updates and patches released to fix DarkSword vulnerabilities

Google confirmed that the vulnerabilities tied to DarkSword have been patched, with fixes rolled out up to iOS 26.3. Updates were also extended to older systems such as iOS 15 and 16.

How to protect your iPhone from DarkSword spyware

The first step is simple — ensure the device is up to date. Apple said keeping software updated remains the most effective defence against such cyberattacks.

For those unable to update, the company recommends enabling Lockdown Mode — a setting designed for high-risk users facing advanced threats.

Additional safety measures and Google Safe Browsing update

Google has added malicious domains linked to DarkSword to its Safe Browsing system.

Users are advised to avoid unknown links and keep security settings enabled.

Whether you are exposed to these attacks depends largely on your software version. Devices running the latest updates are protected; older ones may not be.