• About
  • Privacy
  • Terms
  • Advertise
  • Contact
iOSarena
  • How Tos
  • Guides
  • Reviews
  • Mac Specs
  • iPhone
  • iPad
  • Apple Watch
  • Apple TV
  • Buyers Guide
No Result
View All Result
  • How Tos
  • Guides
  • Reviews
  • Mac Specs
  • iPhone
  • iPad
  • Apple Watch
  • Apple TV
  • Buyers Guide
No Result
View All Result
iOSarena
No Result
View All Result
iPhone Crypto Exploit

iPhone Crypto Exploit Targets Wallet Seed Phrases

MacBook Ultra Rumor Points to Bigger MacBook Pro Upgrade

Home Apple News

iPhone Crypto Wallet Exploit Targets Seed Phrases

Patricia Renee by Patricia Renee
March 5, 2026
Share on FacebookShare on Twitter

iPhone Crypto Exploit threats are raising serious concerns among cryptocurrency users after Google security researchers uncovered a powerful hacking toolkit targeting Apple devices. The exploit focuses on stealing sensitive data from crypto wallets by searching for seed phrases stored on vulnerable iPhones.

Experts warn that the attack can be triggered simply by visiting a compromised website, making it particularly dangerous for users running outdated versions of Apple’s iOS software.

iPhone Crypto Exploit discovered by Google researchers

The iPhone Crypto Exploit toolkit was identified by Google’s Threat Intelligence Group during a cybersecurity investigation. The toolkit, known as Coruna, contains several exploit chains designed to break into iPhones running iOS versions from 13.0 up to 17.2.1.

Security researchers found that the toolkit includes more than twenty individual exploits, some of which were previously unknown vulnerabilities.

The exploit system uses JavaScript code to detect a device’s model and operating system version. Once the device is identified, the system automatically delivers the most effective exploit for that configuration.

Researchers say the attack can occur without any action from the victim beyond visiting a malicious webpage.

Fake crypto websites used to spread the iPhone Crypto Exploit

Investigators discovered that attackers deployed the iPhone Crypto Exploit through compromised websites and fake financial platforms.

Some of the sites imitated cryptocurrency exchanges in order to trick users into visiting them. One example reportedly copied the interface of the WEEX crypto trading platform.

When an iPhone user loads the infected webpage, the exploit attempts to scan the device for financial information.

The malware specifically searches text files, notes, and messages for seed phrases and keywords such as backup phrase or wallet recovery phrase.

It also checks for installed crypto applications including MetaMask, Phantom, Trust Wallet, Exodus, and Uniswap.

By obtaining a wallet seed phrase, attackers can restore access to the wallet and transfer funds instantly.

iPhone Crypto Exploit linked to multiple cyber groups

Cybersecurity researchers believe the exploit toolkit has been used by several different threat actors.

Early attacks were reportedly linked to campaigns targeting Ukrainian users through compromised local websites.

Later investigations discovered the same toolkit operating across hundreds of fraudulent financial websites linked to Chinese cybercriminal networks.

Some analysts believe the exploit may have originated from a sophisticated surveillance toolkit before spreading to criminal groups.

This pattern suggests that powerful hacking tools are increasingly circulating between state-backed operations and financially motivated attackers.

Why seed phrase theft is so dangerous

The iPhone Crypto Exploit focuses primarily on stealing seed phrases, which are the recovery keys for cryptocurrency wallets.

Once attackers obtain this information, they gain full control over the wallet. They can transfer funds immediately and permanently.

Because blockchain transactions cannot usually be reversed, victims often have little chance of recovering stolen assets.

Cybersecurity companies estimate that phishing attacks and private key theft caused hundreds of millions of dollars in crypto losses during the past year.

How users can protect against the iPhone Crypto Exploit

Security experts recommend that iPhone users update their devices to the latest version of iOS as soon as possible.

The Coruna exploit toolkit does not work on newer system updates where the vulnerabilities have already been patched.

Users can also enable Lockdown Mode in their device settings. This feature adds an extra layer of protection against advanced cyberattacks and prevents the exploit from running.

Other recommended precautions include avoiding suspicious websites, keeping crypto seed phrases offline, and storing recovery keys in secure physical locations.

As cryptocurrency adoption grows, researchers warn that mobile devices will remain a major target for cybercriminals seeking access to digital assets.

Tags: iphone exploit
Patricia Renee

Patricia Renee

Next Post
MacBook Ultra Rumor Points to Bigger MacBook Pro Upgrade

MacBook Ultra Rumor Points to Bigger MacBook Pro Upgrade

  • About
  • Privacy
  • Terms
  • Advertise
  • Contact
Managed by Bizmart Media

© 2025 iOSARENA. A Bizmart Holdings LLC Company.

No Result
View All Result
  • How Tos
  • Guides
  • Reviews
  • Mac Specs
  • iPhone
  • iPad
  • Apple Watch
  • Apple TV
  • Buyers Guide

© 2025 iOSARENA. A Bizmart Holdings LLC Company.