Google's Threat Analysis Group (TAG) has detailed a potent, full-chain iOS exploit named DarkSword, which is being actively used in the wild by a diverse set of threat actors. This includes commercial surveillance vendors and suspected state-sponsored espionage groups. The exploit chain combines six distinct vulnerabilities to compromise iPhones running iOS 18.4 through 18.7, allowing for the deployment of a powerful spyware payload called Ghostblade. The attack can be initiated through a simple 'drive-by' method, where a target visits a malicious website. The proliferation of such a powerful exploit chain beyond a single elite actor signifies a dangerous commoditization of advanced mobile surveillance tools, posing a significant risk to high-value targets globally.
DarkSword is a complex exploit chain, not a single vulnerability. It links together six different zero-day or n-day vulnerabilities to move from the sandboxed Safari browser to achieving full control over the underlying operating system. Two of the key vulnerabilities mentioned are:
The full chain likely involves additional vulnerabilities for sandbox escape and privilege escalation to the root level.
Apple has since patched these vulnerabilities in more recent iOS updates. Users running older versions remain vulnerable.
This exploit chain is actively being exploited in the wild. Google TAG has observed multiple, separate campaigns using DarkSword since at least November 2025. The targets are located in Saudi Arabia, Turkey, Malaysia, and Ukraine. The users of the exploit include:
This indicates that the exploit is not exclusive to one group but is being sold or shared among different malicious actors.
A successful DarkSword attack results in a full device compromise, allowing the attacker to deploy the Ghostblade spyware payload. This payload has extensive data exfiltration capabilities, including:
The impact on a targeted individual is a total loss of privacy and security. For an organization, a compromised device belonging to a key executive can lead to the leakage of strategic plans, intellectual property, and other highly confidential information.
Detecting on-device iOS malware is notoriously difficult for end-users. For security teams with Mobile Threat Defense (MTD) solutions, observables include:
| Type | Value | Description |
|---|---|---|
| process_name | Anomalous processes | Unexpected processes running with root privileges. |
| network_traffic_pattern | Outbound connections to C2 | The compromised device making repeated connections to known spyware command-and-control servers. |
| url_pattern | Watering hole domains | Traffic from target devices to specific, lesser-known websites that may be used as watering holes. |
| file_path | /private/var/ |
Creation of unusual files or scripts in writable system directories, where payloads are often stored. |
Software Update (D3-SU).Keeping iOS updated to the latest version is the most critical mitigation, as Apple patches the vulnerabilities used in these chains.
iOS's sandboxing is the primary defense that exploit chains like DarkSword must defeat. While users can't control it, its presence forces attackers to use multiple, complex exploits, increasing the chance of failure or detection.
Enabling Apple's Lockdown Mode is a user-configurable mitigation that hardens the device by reducing its attack surface.
The single most effective defense against exploit chains like DarkSword is to ensure all iPhones are running the latest version of iOS. Apple's security team works to patch the vulnerabilities (like CVE-2026-20700 and CVE-2025-43529) that comprise these chains. Organizations should enforce a policy via their Mobile Device Management (MDM) solution that requires devices to be updated within a short timeframe after a new iOS version is released. For end-users, enabling automatic updates is crucial. Since exploit chains are often built on vulnerabilities present in older OS versions, maintaining up-to-date software is a simple, non-negotiable step that invalidates the attacker's primary weapon.
For individuals at high risk of being targeted by sophisticated spyware (e.g., journalists, activists, senior executives, government officials), enabling Apple's Lockdown Mode is a critical hardening measure. This feature, available in recent iOS versions, drastically reduces the device's attack surface. It disables complex web technologies in Safari (like Just-In-Time JavaScript compilation, which is often targeted by exploits), blocks certain message attachment types, and restricts other features. While it may limit some functionality, Lockdown Mode provides a powerful defense against the zero-click and one-click exploits used by commercial spyware vendors and state actors. It is a targeted countermeasure designed specifically to defeat attacks like DarkSword.
While on-device detection is difficult, organizations can detect compromised iPhones by analyzing their network traffic. All network traffic from corporate mobile devices should be routed through a central proxy or VPN where it can be inspected. Security teams should monitor for connections to known malicious C2 servers associated with spyware vendors. Threat intelligence feeds often provide lists of such domains and IPs. Additionally, using network behavioral analysis to look for anomalies, such as a device suddenly sending small, encrypted 'heartbeat' packets to an unknown server at regular intervals, can be an effective way to uncover a hidden spyware infection like Ghostblade.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats