Someone Has Publicly Leaked An Exploit Kit That Can Hack Millions Of iPhones

A dangerous iPhone hacking tool called DarkSword has been leaked online. Here is what you need to know and how to protect your device right now.
Matilda

iPhone Exploit DarkSword Leaked — Is Your Device at Risk?

Hundreds of millions of iPhones and iPads may be vulnerable right now. A powerful hacking tool called DarkSword has been publicly leaked on a major code-sharing platform, putting devices running older versions of Apple's operating system at serious risk. Security researchers are warning that any criminal with basic technical knowledge can now use it to break into unpatched iPhones within hours.

Someone Has Publicly Leaked An Exploit Kit That Can Hack Millions Of iPhones
Credit: Beata Zawrzel/NurPhoto via Getty Images / Getty Images

What Is DarkSword and Why Is Everyone Alarmed?

DarkSword is an advanced iPhone exploit kit initially discovered during an active hacking campaign targeting Apple device users. The tool is sophisticated enough to steal contacts, messages, call history, Wi-Fi passwords, and other sensitive data stored on a person's iPhone or iPad.

What has security experts deeply worried is not just the tool itself — it is how accessible it has become. Someone uploaded a newer version of DarkSword to a public code repository, making it freely available to anyone with an internet connection. The files are written in basic HTML and JavaScript, meaning there is no specialized coding knowledge required to deploy them.

A co-founder of a mobile security startup described the situation bluntly, warning that the exploits are "way too easy to repurpose" and that criminals and other bad actors should be expected to start using them immediately.

Who Is Actually Vulnerable to This iPhone Hacking Tool?

The DarkSword exploit specifically targets iPhones and iPads running iOS 18 or any earlier version of Apple's operating system. According to Apple's own device usage data, approximately one in four iPhone and iPad users has not yet upgraded to the latest iOS release.

With Apple reporting over 2.5 billion active devices worldwide, that conservative estimate translates to hundreds of millions of people whose phones could be compromised using the now-publicly available tool.

The risk is real and has already been demonstrated. A security researcher confirmed that he successfully hacked an iPad mini running iOS 18 using the leaked DarkSword sample that is circulating online — describing the process as trivially simple for anyone motivated to try.

How DarkSword Actually Hacks Your iPhone

Understanding how this exploit works helps explain why security researchers are treating this as a critical emergency. Once a target visits a compromised or malicious web page, the injected code silently reads and transmits files from the device to a remote server controlled by the attacker.

The tool operates at the filesystem level, accessing data classes that most users would never expect a website to reach. Among the data it can capture are a device's full contact list, text messages, call logs, and the iOS keychain — the secure vault where iPhones store saved passwords, Wi-Fi credentials, and authentication tokens.

The leaked code describes this stage as "post-exploitation activity" — the phase after the malware has already gained a foothold on the device. At that point, the attacker essentially has a silent, invisible copy of the phone's most sensitive contents being transmitted to their server without the owner ever knowing.

Apple Has Responded — But Millions Still Have Not Updated

Apple is aware of the exploit and has already acted. The company issued an emergency security update on March 11 specifically designed for devices that cannot run the very latest version of iOS. A company spokesperson confirmed that devices running updated software are not at risk from these reported attacks.

Apple also pointed to Lockdown Mode as an additional layer of defense, noting it would block these specific types of attacks. Lockdown Mode is a high-security setting that restricts certain device features to dramatically reduce the attack surface for sophisticated intrusions.

Despite this, millions of users remain exposed — either because they have not seen the update notification, have ignored it, or are running older hardware that struggles with newer software versions.

A Growing Wave of iPhone Exploit Tools

DarkSword did not appear in isolation. Its public leak comes just weeks after security researchers uncovered a separate advanced iPhone hacking toolkit, which was reportedly developed by a defense contractor that builds surveillance and hacking tools for government clients.

The back-to-back emergence of these tools signals a troubling shift in the mobile security landscape. Capabilities that were once confined to nation-state actors and intelligence agencies are moving closer to the open market. When government-grade spyware leaks into public repositories, the entire threat model for everyday smartphone users changes overnight.

Researchers also confirmed that DarkSword shares infrastructure with previously analyzed versions of the same tool, suggesting this is part of a sustained and organized operation rather than an isolated incident.

What You Should Do Right Now to Protect Your iPhone

The single most important action any iPhone or iPad user can take today is to update their operating system. Apple confirmed that keeping software up to date remains the most critical step in protecting any Apple device.

Open Settings, tap General, then Software Update. If an update is available, install it without delay. If you are on older hardware that no longer receives the latest iOS version, check whether a separate security patch is available — Apple issued one specifically for these devices on March 11.

Consider enabling Lockdown Mode if you believe you may be at elevated risk. This is especially relevant for journalists, activists, executives, legal professionals, and anyone who regularly handles sensitive information. Lockdown Mode can be activated under Settings, then Privacy and Security.

Exercise caution with unfamiliar links, particularly those arriving through text messages or emails from contacts you do not recognize. DarkSword is a browser-based exploit, which means it can be triggered simply by visiting a malicious page — no app download required.

Why This Story Matters Beyond the Tech Community

Stories like DarkSword tend to be categorized as niche cybersecurity news — relevant to researchers and IT professionals but distant from everyday life. That framing is dangerously wrong here.

This is a tool that steals your passwords. Your messages. Your contacts. The private record of every call you have made. It does this silently, invisibly, and it now requires no technical expertise to deploy against any unpatched device.

The gap between a sophisticated government hacking operation and a criminal with a laptop and a free afternoon just narrowed significantly. That is the real story behind the DarkSword leak — and it is one that should prompt every iPhone user to open their settings tonight.

Security researchers are clear: the exploit works straight out of the box for anyone who downloads it. The only reliable defense right now is a software update that most users already have the ability to install.

Do not wait.

Post a Comment