Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy

DarkSword breaks through iOS defenses: encrypted assets are being targeted.

CN
智者解密
Follow
1 hour ago
AI summarizes in 5 seconds.

Since November 2025, a hidden exploitation chain for iOS vulnerabilities, buried deep within the browser and system, began to quietly ignite. The Google Threat Intelligence Group named it DarkSword and confirmed that it is a set of attack capabilities operated by commercial surveillance vendors to serve national needs, specifically targeting iOS 18.4-18.7. More critically, this exploitation chain can control the camera, microphone, and contacts, and has been confirmed to directly steal account and cryptocurrency asset-related data from centralized exchanges (CEX) and various wallet apps. On one end is "national-level capability," while on the other is personal phone-stacked asset private keys and transaction records, where the narrative of national security collides with personal financial privacy. Subsequently, Apple urgently patched this in iOS 26.3 and, in a rare move, requested users to “upgrade to iOS 26.3 immediately and avoid clicking suspicious links” in a security notice. This series of urgent actions deepened the suspense: what kind of defense line has DarkSword torn apart when even system vendors use urgent terms like "immediately"?

An Invisible Blade: The Organization and Technical Focus of DarkSword

In Google Threat Intelligence's disclosure, DarkSword is not a single hacker individual but an attack team embedded in the commercial surveillance supply chain. The report juxtaposes it with the JavaScript malware family GHOSTBLADE: the former is responsible for identifying high-value targets and integrating intelligence demands, while the latter infiltrates the browser and application layer in a scripted manner, forming the execution "blade" for remote control and data theft. This division of roles indicates a clear task chain and customer orientation behind DarkSword, rather than being a indiscriminate net-casting black market group.

According to publicly available intelligence, starting from November 2025, DarkSword began targeted attacks on devices running iOS 18.4-18.7. The exploitation chain typically launches from a webpage or link embedded with malicious JavaScript; once triggered, the attacker can drill down through the browser sandbox and system protections, ultimately gaining what is termed "full control of the device." In practical terms, "full control" refers not to an abstract description but means the attacker can remotely install and uninstall applications, read and write filesystems, intercept keyboard inputs, capture screen content, manipulate system API calls—almost equivalent to turning the victim’s phone into a silently commandeered machine.

Google Threat Intelligence highlighted a watershed judgment in the incident—"This is the first observation of a complete iOS exploitation chain specifically targeting cryptocurrency data". Compared to previous mobile surveillance tools targeting political figures and journalists, DarkSword's exploitation chain design has elevated CEX and wallet apps to prime target assets, meaning the attack perspective has shifted from "information listening" to "financial plunder." More concerning is the emerging consensus that this is a capability led by commercial surveillance vendors, which for the first time has sunk to the level of ordinary users' phones both in scale and pathway. In other words, even if you are just an ordinary coin holder checking your holdings in the subway, you have already been included within the threat radius this capability can reach.

From Chat Records to Hot Wallets: How the Complete Profile of Crypto Users is Torn Open

Once DarkSword gains "full control of the device," all the security assumptions that originally relied on "locally trusted endpoints" in CEX and wallet apps will be dismantled one by one. Attackers can read sensitive credentials stored by apps in the background, such as login cookies, refresh tokens, thereby bypassing two-factor verification to directly forge sessions; they can target existing local plaintext or weakly encrypted caches in some wallets to steal mnemonics, private key backup prompts, cloud backup key fragments; they can even intercept screen and clipboard content in real time the moment a user inputs an SMS verification code or email verification code, accomplishing "synchronous eavesdropping" on this critical verification step. These operations require no additional cooperation from the user, and they can even be carried out silently while the screen is off.

If we shift our perspective from individual assets to overall behavior, the risk dimension becomes even more glaring. Given the high penetration rate of centralized exchange apps and mobile wallets among crypto users, a single phone often integrates market viewing, fiat currency deposits and withdrawals, contract leverage, cross-chain bridges, social group chats, and other full-chain functionalities. DarkSword's long-term presence on devices not only provides opportunities to access account balances, address lists, and order histories but can also piece together an extraordinarily complete behavioral profile and social graph through chat records, KYC-uploaded files, and location permission history. In this scenario, what’s stolen is not merely a few assets but an individual's financial habits, risk preferences, and the network of associated funds behind them.

It is important to emphasize that, as of now, public channels have not disclosed the exact number of affected devices, nor have any authoritative statistics indicated "how much specific asset loss a certain exchange has suffered." This crucial information has been explicitly noted as missing in briefings, and continuing to push for algorithmic currency amounts or the scale of victims would only create a false sense of certainty. Thus, a more reasonable approach to addressing the threat posed by DarkSword is to regard it as a qualitative turning point of attack capability—once such abilities further "industrialize" in target selection and distribution channels, the potential loss ceiling may truly become apparent.

Compared to traditional finance, the irreversibility of the threat is more evident. In traditional banking scenarios, credit card fraud or online banking hacks, even when losses occur, still have buffers of transaction reversibility and liability inversion: banks can freeze suspicious accounts, retrieve surveillance and logs, and share risks through insurance or risk control models. However, in the crypto world, once the on-chain assets in hot wallets or exchange accounts are transferred and packed into blocks, from a technical perspective, there’s virtually no “retrieving” it. Even if a platform can ban internal accounts, that on-chain transfer record will also be permanently etched in the ledger, standing as undeniable proof of the security model's failure. This technically irreversible and legally difficult to hold accountable characteristic makes DarkSword-type attacks far more damaging in the crypto domain than similar ones in traditional financial systems.

When Systems Are Breached, Hardware Wallets Are No Longer Absolute Safe Zones

On the other side of the ongoing shadow war, hardware wallet manufacturers are attempting to solidify their moats through "more financialized and institutionalized" pathways. A typical signal is that leading manufacturers like Ledger have begun incorporating former Circle executives into management, introducing compliance experience, institutional services, and payment infrastructure capabilities into a hardware team that was originally more engineering-focused. Behind these personnel changes is hardware wallets' desire to shift from "geek toys" to standardized financial facilities aimed at institutional custody and high-net-worth clients, with business boundaries clearly moving beyond just selling the devices themselves.

Model-wise, hardware wallets build a relatively closed security island for users through offline signing and private key isolation: private keys never leave the chip, and devices only communicate through USB, Bluetooth, or NFC, with iOS and other systems serving only to transmit signing requests and display transaction information. However, in the face of system-level exploitation chains like DarkSword, even if the hardware "island" itself is robust, the "bridge" connecting this island—the compromised iOS system—can still become a critical weak point. Altered interactive interfaces at the application layer, hijacked system notifications, and injected malicious intermediary layers can all lead users to unwittingly confirm incorrect transaction content.

Applying this scenario back to DarkSword, we can more intuitively see a new form of attack-defense competition: attackers maintain a continuous presence on devices, modifying the UI of wallet apps or connection services to disguise addresses originally intended for their cold wallets as "regular transfer addresses," even simulating prefixes and tags that closely resemble real addresses; when users initiate transfers or sign smart contract calls, the request parameters received by the hardware wallet have already been altered, but what users see on the iOS screen remains normal text like "transfer 0.1 ETH to frequently used address A." In frequent operations involving small amounts, very few people will verify a long string of addresses word by word on the small screen of a hardware wallet each time. The issue has never been "whether hardware wallets are secure," but rather how much safety redundancy remains in the hardware signing model given that the adversary possesses a national-level exploitation chain.

This also brings another revelation from DarkSword: individuals and institutions, when designing asset defenses, can no longer simplify the issue using the "hot and cold wallet dichotomy," but must incorporate terminal system integrity into consideration. Hardware wallets are undoubtedly still an indispensable layer of the security stack, but they need to work alongside trusted displays, independent confirmation channels, and cross-device comparisons, to potentially provide sufficient buffering in case of system failure, rather than falling into an overestimated "security illusion."

Behind Hong Kong Dollar ETFs and BlackRock's ETHB, the Shift in Security Focus

The timing of the DarkSword incident coincided with the acceleration of the institutionalization and compliance process in crypto. Data from Hong Kong indicates that the total market value of virtual asset ETFs has grown by 142%, reaching approximately 5.4 billion HKD, making it a significant new product in the regional market; at the same time, BlackRock’s staked Ethereum ETF ETHB has reached 254 million USD, intuitively reflecting traditional institutions' substantial willingness to allocate resources within the Ethereum ecosystem through on-chain staking returns. With such substantial capital volumes, discussions about security issues are shifting the narrative focus from "whether the contract has been audited" to "whether every node in the custody chain is clean," including the often-overlooked aspect of terminal device integrity.

For custodians and asset management institutions, traditional risk assessments have focused more on private key management frameworks, cold wallets, multisig solutions, and smart contract logic flaws as on-chain and backend factors. However, the emergence of DarkSword-type attacks has expanded the front line to the mobile phones and computers held by investment managers, compliance officers, and even high-net-worth clients themselves: when national-level surveillance tools begin to target crypto data explicitly, institutions are compelled to re-examine the proportion of mobile transactions and self-custody solutions within their business architecture. In certain scenarios, it may become necessary to reduce mobile signing permissions, forcing high-value operations into environments with higher isolation levels, and using access policies, device fingerprints, and risk scoring to define which endpoints are qualified to access core asset operation interfaces.

From a practical standpoint, institutions are already using multi-layer custody, cold wallets, hardware isolation, and geographical dispersion to hedge against single point failures, but DarkSword indicates that a key premise within these protective assumptions—that “the operator's terminal is trustworthy”—is being undermined. A more robust structure in the future may require adding an additional layer of terminal security gateways and behavioral auditing layers on top of asset custody: even if a signing request comes from a qualified account that has passed KYC, real-time judgments need to be made based on device status, geographical location, and historical behavior patterns, triggering additional manual reviews or automatic blockages when signs of the device being rooted/jailbroken or suspected of being remotely controlled are detected. In a sense, DarkSword is not the opposite of the compliance process but a catalyst that forces institutional security stacks to continue evolving downwards.

Apple Patches 26.3, Bringing Issues of Security Responsibility to Light

After the incident was exposed, Apple issued a rare direct statement in its security announcement: "Users should upgrade to iOS 26.3 immediately and avoid clicking suspicious links." This statement not only confirms the severity of the vulnerability chain but also essentially assigns risk qualitative classification—this is a system-level flaw serious enough to bypass the sandbox and enable remote control, and it has been observed to be actively exploited in the wild. The release of the patch formally establishes a temporal delineation: upgraders are regarded as "patched," while non-upgraders are logically classified as "assuming risk."

However, in the real world, terminal security has never been a problem that can be solved with just an announcement. A large number of users may delay system upgrades due to data usage, fear of lag, or laziness to restart; for some heavy users, jailbreaking and installing applications from unofficial sources is part of their daily routine; combined with the proliferation of shortened links, airdrop phishing, and so-called "beta test invitations" in social media, the attack surface of exploitation chains like DarkSword is magnified multiple times by user behavior. In other words, even if Apple makes a relatively timely fix at the system level, human nature and user habits still allow attackers to preserve sufficient long-term windows.

For developers and wallet teams, the situation presented by the DarkSword incident is not "should we do security," but rather how to continue to survive under the assumption that terminals are not secure. Anticipated technical requirements include: adhering to the "least privilege principle" in permission design, avoiding long-term local storage of highly sensitive data; incorporating device risk detection into application logic, maintaining high sensitivity to signs of jailbreaking, debugging interfaces, and suspicious processes; during transaction interactions, using multi-channel confirmation to reduce the risk of a single interface being tampered with, for example, performing secondary verification through email, independent apps, or even hardware device screens during large transactions on-chain. Security is no longer just a module in the SDK but needs to be embedded into product decision-making and interaction design.

This also reflects the long-term tug-of-war over security responsibilities between the supply side and the demand side. Mobile manufacturers and OS providers emphasize, "We have provided the latest patches and sandbox mechanisms; users and application developers need to use them responsibly"; crypto applications and wallet teams often believe that "system-level vulnerabilities are beyond our capabilities, and the responsibility lies with the platform"; while users oscillate between experience and security, exposing themselves to attack surfaces through behaviors like "not upgrading, ignoring prompts, clicking links indiscriminately." DarkSword highlights these previously overlooked gray areas: without forming more detailed consensus on responsibility delineation and technical cooperation, any party's shortcomings could become a breakthrough point for the penetration of national-level capabilities.

In a Crypto World Under National-Level Surveillance, How to Reconstruct Security Coordinates

Returning to the main narrative, DarkSword is not an ordinary "0-day storm," but a clear signal: national-level surveillance capabilities have officially incorporated personal crypto financial privacy into the radius of suppression and monitoring. From the GHOSTBLADE family to a complete iOS exploitation chain, from CEX and wallet data theft to Apple being forced into emergency patching, this narrative arc reveals that a commercial surveillance supply chain originally serving national security and intelligence demands is systematically entering the everyday environments of retail phones and institutional front-end transactions.

Surrounding DarkSword, we can see at least three layers of contestation occurring simultaneously. The first layer is the national security narrative framed under the guise of "counter-terrorism, anti-money laundering, and combating cross-border capital flows," where possessing more granular personal crypto asset data is viewed as a logical capability building. The second layer is the tech giants' maintenance of system control—closed ecosystems like iOS simultaneously strengthen control over users and developers under the pretext of security while inevitably exposing their technical limits in the face of national-level attacks. The third layer is the demand for asset sovereignty from individuals and institutions, which is reflected both in the decentralized motto "Not your keys, not your coins" and in the increasingly expansive asset volumes among ETFs, custody banks, and compliant trading platforms. The tensions among these three factors are reshaping the coordinate system of security within the crypto world.

Looking ahead, DarkSword-type incidents are likely to accelerate evolutions in three directions. Firstly, further strengthening of terminal hardware security: from secure elements and trusted execution environments to independent display and input paths, mobile phones may be forced to reserve more physical and logical space for financial-grade security beyond just cost and user experience. Secondly, a more layered custody architecture, which separates "signing rights," "viewing rights," and "operational advisory rights" amongst different subjects and different security levels of terminals, reducing the systemic harm of any single point failure. Thirdly, the redefinition of data legal boundaries, including the legality of surveillance tool usage, the boundaries of device forensics and remote implanting, and the privacy protection obligations of crypto asset holdings and transaction data, will be forced to take clearer institutional expressions through practical conflicts.

For individual participants, the more realistic takeaway is that: security thinking must upgrade from "protecting against phishing links" to "assuming the terminal may have already been compromised". This does not mean everyone has to become a security expert, but rather requires establishing a stricter self-restraint system in daily operations—layered asset management, moving high-value assets off of mobile devices; reducing the compounding of all financial and social functions on a single device; habitually performing multi-device verification and delayed confirmations during key operations; viewing system upgrades and security announcements as a part of asset management rather than "disruptions to experience." DarkSword has torn apart not just a segment of iOS code defense but has also mandated a forced update of the entire industry's security imagination.

Join our community, let’s discuss and become stronger together!
Official Telegram community: https://t.me/aicoincn
AiCoin Chinese Twitter: https://x.com/AiCoinzh

OKX Welfare Group: https://aicoin.com/link/chat?cid=l61eM4owQ
Binance Welfare Group: https://aicoin.com/link/chat?cid=ynr7d1P6Z

免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

龙虾一键接入,助交易稳赚
广告
|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Selected Articles by 智者解密

6 minutes ago
Under the impact of energy shocks, the divergence between the Federal Reserve and cryptocurrency funds.
14 minutes ago
Energy shock returns: Federal Reserve pressured again.
23 minutes ago
Interest Rate Cut Expectations Rise: Who is Getting Ahead in the Crypto World?
View More

Table of Contents

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Related Articles

avatar
avatar智者解密
6 minutes ago
Under the impact of energy shocks, the divergence between the Federal Reserve and cryptocurrency funds.
avatar
avatar智者解密
14 minutes ago
Energy shock returns: Federal Reserve pressured again.
avatar
avatar智者解密
23 minutes ago
Interest Rate Cut Expectations Rise: Who is Getting Ahead in the Crypto World?
avatar
avatar智者解密
32 minutes ago
Trump Bets on AI Law: Cryptocurrency Regulation Must Keep Up with Changes
avatar
avatarBitMart 币市
39 minutes ago
BitMart officially launches Web3 wallet, creating a one-stop entry for on-chain assets and trading.
APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink