Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Spyware Found Again This Month, Hundreds of Millions of iPhones Face Security Risks
Cybersecurity company Lookout, mobile security firm iVerify, and researchers from Google under Alphabet have jointly released an analysis report on the malicious software named “Darksword.” They state that this new iPhone hacking tool is extremely widespread, capable of stealing not only passwords and photos but also directly accessing iMessage, WhatsApp, and Telegram chat logs, and even reading Apple Health records and cryptocurrency wallet credentials.
The researchers noted that this is the second discovery this month of spyware targeting iPhones and other Apple devices. On March 3rd, Google and iVerify disclosed another powerful iPhone spyware called “Coruna.” They found that Darksword is hosted on the same servers. In recent weeks, Darksword has been embedded on dozens of Ukrainian websites. It is reportedly web-based, allowing zero-click infections—users only need to load an infected webpage in their browser, and the device will be silently hijacked without warning.
Darksword abandons traditional spyware installation methods, instead employing highly covert fileless malware techniques. It directly hijacks legitimate iPhone system processes, rapidly extracting data within minutes of infection with minimal traces. Rebooting the phone can remove the infection, but data is often already stolen.
Google stated that its researchers observed multiple commercial vendors and suspected state-linked hackers using Darksword in targeted operations against targets in Saudi Arabia, Turkey, Malaysia, and Ukraine.
According to iVerify and Lookout, the malware is delivered to iPhone users running iOS versions 18.4 to 18.6.2 who have visited one of dozens of Ukrainian websites. Apple released these system versions between March and August 2025.
The researchers indicated that it is currently unclear how many iPhones are vulnerable to Darksword attacks. Apple has issued multiple patches addressing the underlying vulnerabilities exploited by Darksword. However, many users have not installed the updates. Based on publicly estimated data from iVerify and Lookout, approximately 220 million to 270 million iPhones still run vulnerable versions of iOS.
An Apple spokesperson said these vulnerabilities target outdated software, and for users running the latest operating system versions, the underlying flaws have been fixed in multiple updates over the past few years. Keeping software up to date remains the most important step users can take to maintain high security on Apple devices. Additionally, Safari’s built-in Apple Security Browsing feature has blocked all malicious domains identified by Google to prevent further exploitation.