iPhone Crypto Exploit threats are raising serious concerns among cryptocurrency users after Google security researchers uncovered a powerful hacking toolkit targeting Apple devices. The exploit focuses on stealing sensitive data from crypto wallets by searching for seed phrases stored on vulnerable iPhones.
Experts warn that the attack can be triggered simply by visiting a compromised website, making it particularly dangerous for users running outdated versions of Apple’s iOS software.
iPhone Crypto Exploit discovered by Google researchers
The iPhone Crypto Exploit toolkit was identified by Google’s Threat Intelligence Group during a cybersecurity investigation. The toolkit, known as Coruna, contains several exploit chains designed to break into iPhones running iOS versions from 13.0 up to 17.2.1.
Security researchers found that the toolkit includes more than twenty individual exploits, some of which were previously unknown vulnerabilities.
The exploit system uses JavaScript code to detect a device’s model and operating system version. Once the device is identified, the system automatically delivers the most effective exploit for that configuration.
Researchers say the attack can occur without any action from the victim beyond visiting a malicious webpage.
Fake crypto websites used to spread the iPhone Crypto Exploit
Investigators discovered that attackers deployed the iPhone Crypto Exploit through compromised websites and fake financial platforms.
Some of the sites imitated cryptocurrency exchanges in order to trick users into visiting them. One example reportedly copied the interface of the WEEX crypto trading platform.
When an iPhone user loads the infected webpage, the exploit attempts to scan the device for financial information.
The malware specifically searches text files, notes, and messages for seed phrases and keywords such as backup phrase or wallet recovery phrase.
It also checks for installed crypto applications including MetaMask, Phantom, Trust Wallet, Exodus, and Uniswap.
By obtaining a wallet seed phrase, attackers can restore access to the wallet and transfer funds instantly.
iPhone Crypto Exploit linked to multiple cyber groups
Cybersecurity researchers believe the exploit toolkit has been used by several different threat actors.
Early attacks were reportedly linked to campaigns targeting Ukrainian users through compromised local websites.
Later investigations discovered the same toolkit operating across hundreds of fraudulent financial websites linked to Chinese cybercriminal networks.
Some analysts believe the exploit may have originated from a sophisticated surveillance toolkit before spreading to criminal groups.
This pattern suggests that powerful hacking tools are increasingly circulating between state-backed operations and financially motivated attackers.
Why seed phrase theft is so dangerous
The iPhone Crypto Exploit focuses primarily on stealing seed phrases, which are the recovery keys for cryptocurrency wallets.
Once attackers obtain this information, they gain full control over the wallet. They can transfer funds immediately and permanently.
Because blockchain transactions cannot usually be reversed, victims often have little chance of recovering stolen assets.
Cybersecurity companies estimate that phishing attacks and private key theft caused hundreds of millions of dollars in crypto losses during the past year.
How users can protect against the iPhone Crypto Exploit
Security experts recommend that iPhone users update their devices to the latest version of iOS as soon as possible.
The Coruna exploit toolkit does not work on newer system updates where the vulnerabilities have already been patched.
Users can also enable Lockdown Mode in their device settings. This feature adds an extra layer of protection against advanced cyberattacks and prevents the exploit from running.
Other recommended precautions include avoiding suspicious websites, keeping crypto seed phrases offline, and storing recovery keys in secure physical locations.
As cryptocurrency adoption grows, researchers warn that mobile devices will remain a major target for cybercriminals seeking access to digital assets.

