Threat Actor Characterization
DarkSword
ID: 61a26aa8c3fc9ba021d8ac98c657382e59421| DarkSword Exploit | DarkSword iOS Exploit | Da*********************** | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
DarkSword is a multi-actor iOS full-chain exploit and spyware-delivery toolkit observed since at least November 2025. Public reporting ties its use to UNC6748, UNC6353, and PARS Defense-associated operations, with different final-stage payloads including GHOSTKNIFE, GHOSTBLADE, and GHOSTSABER. It has been used in lure-driven and watering-hole campaigns against targets in Saudi Arabia, Turkey, Malaysia, and Ukraine.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1189 | Drive-by Compromise | TA0001 |
|
| T1059.007 | JavaScript | TA0002 | |
| T1105 | Ingress Tool Transfer | TA0011 |
|
| T1068 | Exploitation for Privilege Escalation | TA0004 | |
| T1055 | Process Injection | TA0004 TA0005 |
|
| T1005 | Data from Local System | TA0009 |
|
| T1119 | Automated Collection | TA0009 |
|
| T1041 | Exfiltration Over C2 Channel | TA0010 |
|
| T1071.001 | Web Protocols | TA0011 |
|
| T1070.004 | File Deletion | TA0005 |
|
DarkSword — Multi-Actor iOS Exploit Chain / Spyware Delivery Toolkit
Classification: TLP:WHITE - Open Source Intelligence (OSINT)
Category: Mobile spyware / exploit toolkit - Origin: Not attributed to a single country; observed in operations linked to Russia-aligned espionage activity, a Turkish commercial surveillance vendor, and a separate threat cluster.
Author: iQBlack CTI Team
Executive Summary
DarkSword is best assessed as a shared iOS exploitation and spyware-delivery framework rather than a single standalone malware family. Public reporting by Google Threat Intelligence Group (GTIG), iVerify, Reuters, and related coverage indicates that the toolkit has been used by multiple operators since at least November 2025 against targets in Saudi Arabia, Turkey, Malaysia, and Ukraine. The observed post-exploitation payloads differ by operator and include GHOSTKNIFE, GHOSTSABER, and GHOSTBLADE.
Technically, DarkSword is significant because it represents a full-chain iOS compromise path that uses six vulnerabilities across WebKit / JavaScriptCore, dyld, ANGLE, and the iOS kernel to reach full device compromise on supported versions. GTIG assessed that DarkSword supports iOS 18.4 through 18.7, while iVerify’s recovered Ukrainian watering-hole chain specifically targeted iOS 18.4 through 18.6.2. In both cases, the exploitation pattern is web-delivered and does not require a traditional app installation.