Risky Bulletin

Between Two Nerds: Its raining iOS exploit kits!

Mar 23, 2026
The Grugq, a security researcher known for analyses of threat actor tradecraft, breaks down recent iOS exploit kit sightings. He discusses why top-tier exploits stay hidden. He explains resale and abuse of older tools. He explores geofenced targeting and operator tweaks that add crypto-theft. Practical advice on updating iOS and using Lockdown Mode is also covered.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Top Tier Exploits Are Carefully Conserved Nation State Tools

  • High-end iOS exploit kits are bespoke nation-state tools with exceptional engineering quality.
  • Karuna was top-tier, likely sold originally to governments and used sparingly with strong OPSEC, which kept it undetected for years.
INSIGHT

Exploit Value Depreciates And Increases Operational Risk

  • Exploit kits age and get resold down a buyer chain until lower-budget operators burn them quickly.
  • Karuna passed from high-value buyers to criminals who used it widely against crypto targets, exposing the kit to detection.
INSIGHT

Same Kit, Multiple Customers With Different Skill Levels

  • Multiple customers used Dark Sword with varying sophistication, from crude deployments to customized stealthy variants.
  • Google, iVerify and Lookout found at least three different customer campaigns (Saudi, Turkish vendor, Russian), showing diverse usage.
Get the Snipd Podcast app to discover more snips from this episode
Get the app