Google's Threat Analysis Group (TAG) has detailed a potent, full-chain iOS exploit named DarkSword, which is being actively used in the wild by a diverse set of threat actors. This includes commercial surveillance vendors and suspected state-sponsored espionage groups. The exploit chain combines six distinct vulnerabilities to compromise iPhones running iOS 18.4 through 18.7, allowing for the deployment of a powerful spyware payload called Ghostblade. The attack can be initiated through a simple 'drive-by' method, where a target visits a malicious website. The proliferation of such a powerful exploit chain beyond a single elite actor signifies a dangerous commoditization of advanced mobile surveillance tools, posing a significant risk to high-value targets globally.
DarkSword is a complex exploit chain, not a single vulnerability. It links together six different zero-day or n-day vulnerabilities to move from the sandboxed Safari browser to achieving full control over the underlying operating system. Two of the key vulnerabilities mentioned are:
The full chain likely involves additional vulnerabilities for sandbox escape and privilege escalation to the root level.
Apple has since patched these vulnerabilities in more recent iOS updates. Users running older versions remain vulnerable.
This exploit chain is actively being exploited in the wild. Google TAG has observed multiple, separate campaigns using DarkSword since at least November 2025. The targets are located in Saudi Arabia, Turkey, Malaysia, and Ukraine. The users of the exploit include:
This indicates that the exploit is not exclusive to one group but is being sold or shared among different malicious actors.
A successful DarkSword attack results in a full device compromise, allowing the attacker to deploy the Ghostblade spyware payload. This payload has extensive data exfiltration capabilities, including:
The impact on a targeted individual is a total loss of privacy and security. For an organization, a compromised device belonging to a key executive can lead to the leakage of strategic plans, intellectual property, and other highly confidential information.
Detecting on-device iOS malware is notoriously difficult for end-users. For security teams with Mobile Threat Defense (MTD) solutions, observables include:
/private/var/Software Update (D3-SU).Keeping iOS updated to the latest version is the most critical mitigation, as Apple patches the vulnerabilities used in these chains.
iOS's sandboxing is the primary defense that exploit chains like DarkSword must defeat. While users can't control it, its presence forces attackers to use multiple, complex exploits, increasing the chance of failure or detection.
Enabling Apple's Lockdown Mode is a user-configurable mitigation that hardens the device by reducing its attack surface.
The single most effective defense against exploit chains like DarkSword is to ensure all iPhones are running the latest version of iOS. Apple's security team works to patch the vulnerabilities (like CVE-2026-20700 and CVE-2025-43529) that comprise these chains. Organizations should enforce a policy via their Mobile Device Management (MDM) solution that requires devices to be updated within a short timeframe after a new iOS version is released. For end-users, enabling automatic updates is crucial. Since exploit chains are often built on vulnerabilities present in older OS versions, maintaining up-to-date software is a simple, non-negotiable step that invalidates the attacker's primary weapon.
For individuals at high risk of being targeted by sophisticated spyware (e.g., journalists, activists, senior executives, government officials), enabling Apple's Lockdown Mode is a critical hardening measure. This feature, available in recent iOS versions, drastically reduces the device's attack surface. It disables complex web technologies in Safari (like Just-In-Time JavaScript compilation, which is often targeted by exploits), blocks certain message attachment types, and restricts other features. While it may limit some functionality, Lockdown Mode provides a powerful defense against the zero-click and one-click exploits used by commercial spyware vendors and state actors. It is a targeted countermeasure designed specifically to defeat attacks like DarkSword.
While on-device detection is difficult, organizations can detect compromised iPhones by analyzing their network traffic. All network traffic from corporate mobile devices should be routed through a central proxy or VPN where it can be inspected. Security teams should monitor for connections to known malicious C2 servers associated with spyware vendors. Threat intelligence feeds often provide lists of such domains and IPs. Additionally, using network behavioral analysis to look for anomalies, such as a device suddenly sending small, encrypted 'heartbeat' packets to an unknown server at regular intervals, can be an effective way to uncover a hidden spyware infection like Ghostblade.
Google TAG first observes the DarkSword exploit chain being used in targeted attacks.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.