Apple Releases Essential Update for ‘Coruna’ Vulnerability
We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!
Summary Overview
- Apple launches iOS 15.8.7 and iOS 16.7.15 to resolve Coruna vulnerabilities.
- The Coruna exploit encompasses 23 vulnerabilities across iOS versions 13 through 17.2.1.
- Detected by Googleâs Threat Intelligence Group in early 2026.
- Coruna is exploited by both state-sponsored and financially motivated actors.
Update Rollout for iOS and iPadOS
Apple has introduced crucial updates, iOS 15.8.7 and iOS 16.7.15, to tackle vulnerabilities linked to the Coruna exploit. These enhancements are vital for devices that cannot upgrade to the latest iOS iteration, helping to keep older devices secure. Corresponding versions of iPadOS have been provided with these updates as well.
Understanding the Coruna Exploit
The Coruna exploit toolkit, noted by Googleâs Threat Intelligence Group (GTIG) in early 2026, comprises 23 exploits across five comprehensive iOS exploit chains. This toolkit specifically targets devices operating on iOS versions from 13 to 17.2.1, utilizing sophisticated techniques alongside non-public exploitation methods and evasion strategies.
Chronology and Identification of Coruna
First detected by GTIG in February 2026, Coruna was associated with a client of a commercial surveillance vendor. It was subsequently traced back to watering hole attacks orchestrated by UNC6353, a group believed to be state-sponsored from Russia, which aimed at Ukrainian websites. GTIG further linked Coruna to a financially driven Chinese criminal organization that propagated the exploit through counterfeit cryptocurrency exchanges and gambling platforms.
Investigating Corunaâs Architecture
Researchers obtained significant insights into the exploitâs framework after a threat actor inadvertently deployed a debug version. This mistake revealed internal code designations and documentation, illuminating the exploitâs complex architecture.
Conclusion
In light of the Coruna exploit, Apple has proactively rolled out updates for legacy iOS and iPadOS versions, protecting users from potential dangers. The partnership between industry figures like Google and security firms highlights the necessity for diligence and prompt responses to emerging cyber threats.
