The DarkSword exploit kit, chaining 6 vulnerabilities including 3 zero-days, was publicly leaked on GitHub around March 22-23, 2026. An estimated 221 million iPhones running iOS 18.4 through 18.6.2 are at risk of full device takeover through a single malicious webpage visit.
Published: March 25, 2026 | cybersecurity
Photo: NurPhoto via TechCrunch
DarkSword is an iOS exploit kit developed by nation-state-linked threat actors. According to Google's Threat Intelligence Group (GTIG), this tool had been used in targeted surveillance campaigns before being publicly leaked. It represents one of the most sophisticated attack toolkits ever made publicly available.
The exploit operates entirely through JavaScript: a victim only needs to visit a weaponized webpage and the attack chain triggers automatically without any user interaction. Once compromised, the spyware gains full access to messages, camera, microphone, location, and all device data.
▸ If you're running iOS 18.5 on your iPhone, your device could be fully compromised by a single webpage visit
Photo: The Hacker News
Around March 22-23, 2026, the complete source code of the DarkSword exploit kit was posted publicly on GitHub by an anonymous account. The repository contained full exploit code for all 6 vulnerabilities, including detailed deployment documentation and command-and-control infrastructure.
GitHub removed the repository within hours, but the source code had already been mirrored and widely circulated across underground security forums and Telegram channels. According to security researchers, this represents the most dangerous nation-state cyber weapon leak since NSO Group's Pegasus spyware was exposed in 2021.
▸ The exploit code is now in the hands of anyone with sufficient technical skill, no longer restricted to nation-state actors
6 vulnerabilities exploited sequentially, from webpage visit to full device takeover
Malicious JavaScript triggers a heap overflow bug in the Safari browser engine through a crafted webpage.
A sandbox vulnerability allows the exploit to break free from the browser's isolation environment.
A zero-day kernel flaw grants the attacker root-level access to the entire iOS operating system.
Circumvents Apple's code verification to load and execute unsigned spyware payloads.
The spyware writes itself into the system partition, surviving device reboots.
Complete access to messages, camera, microphone, location, photos, and all device data.
DarkSword affects devices running iOS versions 18.4 through 18.6.2, covering all iPhone models supporting iOS 18. Check your iOS version by going to:
Apple released an emergency patch on March 11, 2026 for older iOS versions, even before the exploit kit was publicly leaked. This indicates Apple was aware of the vulnerabilities through internal reports or security research disclosures.
Apple also confirmed that Lockdown Mode can block the DarkSword exploit chain by disabling the advanced web features that the toolkit requires to initiate its attack. However, not all users have this feature enabled as it significantly restricts normal device functionality.
▸ If you haven't updated iOS since before March 11, your device has been in a vulnerable state for the past 2 weeks
Photo: Wikimedia Commons
| DarkSword | Pegasus | |
|---|---|---|
| Target | iOS 18.4 - 18.6.2 | iOS / Android |
| Exploits | 6 (3 zero-day) | 3+ zero-day |
| Attack vector | JavaScript (web visit) | iMessage (zero-click) |
| Accessibility | Publicly leaked, free | Sold to governments, millions USD |
| Affected devices | ~221 million | Tens of thousands (targeted) |
| Status | Leaked March 2026 | Exposed 2021 |
The critical difference between DarkSword and Pegasus lies in accessibility. NSO Group's Pegasus was sold exclusively to governments for millions per license, limiting victims to tens of thousands. DarkSword, after being freely and publicly leaked on GitHub, opens the door to unprecedented mass exploitation with 221 million devices in the vulnerable range.
Go to Settings > General > Software Update and install the latest available version. Apple's emergency patch addresses all 6 vulnerabilities.
Go to Settings > Privacy & Security > Lockdown Mode. It restricts functionality but blocks the DarkSword exploit chain.
If you visited unfamiliar websites or received suspicious links recently, consider backing up important data and performing a factory reset.
Avoid clicking links sent via messages, email, or social media from senders you cannot verify.
▸ An iOS update takes about 15-20 minutes but could protect all your personal data, photos, messages, and financial information on your device
Related Topics
Stay on top of trends
Bookmark this page and check back often for the latest updates and insights.