Disclaimer: SpendNode is for informational purposes only and is not a financial advisor. Some links on this site are affiliate links - we may earn a commission at no extra cost to you. This does not affect our data or rankings. Affiliate DisclosureView Policy
Security Hub

Google Finds iOS Malware That Hunts for Coinbase, MetaMask, and 11 Other Crypto Apps

Updated: Mar 20, 2026By SpendNode Editorial

Key Analysis

The DarkSword exploit chain uses six iOS vulnerabilities to deploy Ghostblade, a data stealer targeting 13 crypto exchange and wallet apps on unpatched iPhones.

Google Finds iOS Malware That Hunts for Coinbase, MetaMask, and 11 Other Crypto Apps

Google disclosed a six-vulnerability iOS exploit chain called DarkSword on March 20, 2026 that delivers malware specifically designed to extract data from 13 crypto exchange and wallet applications. The malware, dubbed Ghostblade, targets apps including Coinbase, Binance, Kraken, MetaMask, and Ledger, then deletes itself after exfiltration.

iPhones running iOS 18.4 through 18.7 are vulnerable. Apple patched all six flaws with iOS 26.3.

Six Flaws, Three Zero-Days, One Kill Chain

DarkSword chains six vulnerabilities together to move from a compromised website to full device control:

Three zero-days (previously unknown):

  • CVE-2026-20700: a PAC bypass in dyld, patched in iOS 26.3
  • CVE-2025-43529: JavaScriptCore memory corruption, patched in iOS 18.7.3 and 26.2
  • CVE-2025-14174: ANGLE memory corruption, patched in iOS 18.7.3 and 26.2

Three known vulnerabilities:

  • CVE-2025-31277: JavaScriptCore flaw, patched in iOS 18.6
  • CVE-2025-43510: kernel memory management, patched in iOS 18.7.2 and 26.1
  • CVE-2025-43520: kernel memory corruption, patched in iOS 18.7.2 and 26.1

The attack starts when a victim visits a compromised or malicious website. A hidden iFrame fingerprints the Safari browser. If the device is running a vulnerable iOS version, DarkSword fires a JavaScriptCore JIT exploit for initial code execution, escapes the WebContent sandbox through GPU process exploitation via WebGPU, injects into the mediaplaybackd daemon, then escalates to kernel-level access through CVE-2025-43520 for arbitrary read/write. The entire chain runs without user interaction beyond visiting the page.

Ghostblade Goes Straight for Crypto

Once DarkSword grants kernel access, the final payload is Ghostblade, a JavaScript-based data stealer with a specific appetite for crypto applications.

Exchange apps targeted: Coinbase, Binance, Kraken, KuCoin, OKX, MEXC

Wallet apps targeted: Ledger, Trezor, MetaMask, Exodus, Uniswap, Phantom, Gnosis Safe

Beyond crypto-specific data, Ghostblade hoovers up nearly everything on the device: emails, iCloud Drive files, contacts, SMS and iMessage content, Safari browsing history and cookies, saved passwords, photos, call history, Wi-Fi credentials, location history, calendar data, Health app information, installed app lists, Apple Notes, and message histories from Telegram and WhatsApp.

The operational pattern is hit-and-run. Ghostblade collects all available data, injects into Springboard to exfiltrate via HTTPS, then deletes its temporary files and terminates itself. There is no persistent implant. The malware gets in, takes everything, and vanishes.

Three Threat Actors, Four Countries

Google identified at least three separate groups deploying DarkSword since November 2025:

UNC6353, a suspected Russian state-sponsored group, ran watering hole attacks on Ukrainian government websites starting in November 2025 and continued through December, targeting users on iOS 18.4 through 18.6.

UNC6748 targeted Saudi Arabian users in November 2025 using a fake Snapchat lookalike domain (snapshare[.]chat).

PARS Defense, a Turkish commercial surveillance vendor, deployed the exploit chain against targets in Turkey in November 2025.

Campaigns were also observed in Malaysia. Google estimates hundreds of millions of unpatched devices running iOS 13 through 18.6.2 remain potentially vulnerable across the combined exploit kits, though the crypto-targeting Ghostblade payload is specific to the DarkSword chain on iOS 18.4 through 18.7.

What Crypto Users Should Do Right Now

The fix is straightforward: update. Apple patched the three zero-days in iOS 26.3. The three previously known flaws were patched across iOS 18.6, 18.7.2, and 26.1. Any iPhone running iOS 26.3 or later is not vulnerable to DarkSword.

For users who manage crypto through mobile apps, this is a reminder that the phone itself is an attack surface. Hardware wallets like Ledger and Trezor are targeted by the data extraction, but the physical signing mechanism remains intact. Ghostblade can steal app data and saved passwords, but it cannot extract private keys from a hardware device's secure element. If your exchange or wallet credentials were compromised before you updated, rotating passwords and revoking API keys is the immediate step.

DarkSword is the second major iOS exploit kit Google has disclosed in recent months (after Coruna, which targeted older iOS 13-17 versions). Both were adopted by multiple threat actors, from state intelligence services to commercial spyware vendors. The self-custody model does not protect against device-level compromise if the signing interface is on the compromised phone itself.

Overview

Google disclosed DarkSword, a six-vulnerability iOS exploit chain that delivers Ghostblade malware specifically targeting 13 crypto exchange and wallet apps including Coinbase, Binance, Kraken, MetaMask, Ledger, and Phantom. The chain uses three zero-days and three known flaws to move from a malicious website visit to full device compromise without user interaction. At least three threat actors (a Russian state group, a Saudi-targeting operation, and a Turkish surveillance vendor) deployed DarkSword across Ukraine, Saudi Arabia, Turkey, and Malaysia since November 2025. Ghostblade operates as a hit-and-run data stealer, extracting everything from saved passwords to Telegram messages before self-destructing. Apple patched all flaws in iOS 26.3. Users on iOS 18.4 through 18.7 should update immediately and rotate credentials for any crypto accounts accessed from affected devices.

Recommended Reading

Frequently Asked Questions

Does this affect Android devices?

No. DarkSword and Ghostblade are iOS-specific. The exploit chain targets Safari's JavaScriptCore engine and iOS kernel components. Android users face separate threats.

Can Ghostblade steal crypto directly from my wallet?

Ghostblade extracts app data, saved passwords, cookies, and message histories. If your wallet app stores sensitive data locally or if you have passwords saved in Safari/Keychain that grant access to exchange accounts, those are exposed. It cannot bypass a hardware wallet's secure element or extract keys that never leave the hardware device.

I updated to iOS 26.3. Am I safe?

From DarkSword, yes. All six vulnerabilities in the chain are patched in iOS 26.3. If you were on a vulnerable version (18.4-18.7) and visited compromised websites before updating, consider your stored credentials and crypto app data potentially exposed.

DisclaimerThis article is provided for informational purposes only and does not constitute financial advice. All fee, limit, and reward data is based on issuer-published documentation as of the date of verification.

Have a question or update?

Discuss this analysis with the community on X.

Discuss on X

Comments

Comments are moderated and may take a moment to appear.

Loading comments...