Science & Space

How to Trace the Origins of the Coruna Exploit Kit: Linking It to Operation Triangulation

2026-05-03 01:40:13

Introduction

In March 2026, security researchers from Google and iVerify disclosed a sophisticated exploit kit targeting Apple iPhones. This kit, internally named Coruna, was first deployed by a surveillance vendor’s client, then adapted for watering-hole attacks in Ukraine and financially motivated campaigns in China. A debug version leaked internal names, including “Coruna.” The kit leveraged multiple patched vulnerabilities and two zero-days—CVE-2023-32434 and CVE-2023-38606—that originally surfaced in Operation Triangulation, a complex mobile APT campaign uncovered by Kaspersky during internal network monitoring. Analysis revealed that Coruna’s kernel exploit for these CVEs is an updated version of the same exploit used in Operation Triangulation, and the framework includes four additional kernel exploits with shared code. This guide walks you through the process of analyzing Coruna and connecting it to Operation Triangulation.

How to Trace the Origins of the Coruna Exploit Kit: Linking It to Operation Triangulation
Source: securelist.com

What You Need

Step-by-Step Analysis Guide

Step 1: Collect and Review Initial Reports

Begin by gathering the foundational reports from Google and iVerify published on March 4, 2026. Note that Coruna was first used by a surveillance vendor’s customer, then repurposed by other attackers. Pay attention to the list of vulnerabilities: the kit exploits several already-patched CVEs plus CVE-2023-32434 and CVE-2023-38606. Cross-reference these with Kaspersky’s earlier reports on Operation Triangulation to identify overlapping zero-days.

Step 2: Understand the Operation Triangulation Campaign

Operation Triangulation was discovered by Kaspersky in 2023 when suspicious network traffic originated from iOS devices on their corporate Wi-Fi. The campaign used a spyware implant and multiple zero-days, including CVE-2023-32434 and CVE-2023-38606. Read Kaspersky’s detailed analysis and the presentation at the 37th Chaos Communication Congress (37C3). Familiarize yourself with the attack chain and the original exploit code to establish a baseline for comparison.

Step 3: Identify Active Distribution Links for Coruna

According to Google’s report, some distribution links for the Coruna kit remained active at the time of publication. Try to access these links (if still live) to download the sample. Use caution: handle malware in an isolated sandbox. If links are dead, search threat intelligence platforms for captured samples. The debug version of the kit revealed internal exploit names and the framework name – prioritize obtaining that variant.

Step 4: Decrypt and Extract Components

The Coruna kit may be encrypted or obfuscated. Use dynamic analysis to decrypt payloads as they execute, or find decryption keys in public reports. Extract all components: the kernel exploits, userland payloads, and configuration files. Document the file hashes and structure.

Step 5: Analyze the Kernel Exploit for CVE-2023-32434 and CVE-2023-38606

Focus on the kernel exploit that targets these two vulnerabilities. Disassemble the binary and compare it to the known exploit code from Operation Triangulation. Look for code similarities: identical function names, constants, exploitation primitives, and patch bypasses. Note that Kaspersky found Coruna’s version is an updated version of the Triangulation exploit. Identify the differences (e.g., updated offsets, new bypasses) and how they relate to later iOS versions.

How to Trace the Origins of the Coruna Exploit Kit: Linking It to Operation Triangulation
Source: securelist.com

Step 6: Examine the Four Additional Kernel Exploits

Coruna includes four kernel exploits not seen in Operation Triangulation. Two of these were developed after the discovery of Triangulation. For each exploit, document the vulnerability (CVE if known), target iOS version, exploitation technique, and code structure. Look for shared code across all exploits—common libraries, utility functions, or a unified exploit framework architecture. This indicates the kit was not patchworked but designed cohesively.

Step 7: Compare Code Across Components

Beyond kernel exploits, analyze other components of Coruna (e.g., persistence, privilege escalation, data exfiltration). Use a diffing tool to compare code fragments with those in the kernel exploits. Shared strings, function prologues, or error-handling routines reveal the same development team. Kaspersky noted that code similarities from kernel exploits appear in other Coruna components, reinforcing the unified framework conclusion.

Step 8: Reconstruct the Attack Chain

Based on your analysis, map out the Coruna attack chain. Compare it to the simplified diagram provided in the original reports (highlighting the shared kernel exploit in red). Note how the delivery mechanism (e.g., watering-hole, spear-phishing) and payload differ from Operation Triangulation. Document the timeline: the zero-days were first used in Triangulation, then later integrated into Coruna along with newer exploits.

Step 9: Draw Conclusions and Report Findings

Summarize that Coruna is not a one-off kit but an evolution of the same framework used in Operation Triangulation. Support this with evidence of shared code, updated exploits, and the developer’s internal naming. Publish your findings to the security community, referencing both Kaspersky’s and Google’s work. Include indicators of compromise (IoCs) to help others detect the kit.

Tips

Explore

Intel's Crescent Island: Linux Driver Upgrades for Next-Gen AI Inference GPU – Q&A How Astronomers Cracked the 50-Year-Old gamma-Cas X-Ray Mystery Canonical Overhauls Launchpad Series Page for Ubuntu 26.04 LTS After Decade-Long Stagnation Python Issues Emergency Releases 3.14.2 and 3.13.11 to Fix Critical Regressions and Security Vulnerabilities Inside the $573M Interconnected Finances of Elon Musk's Companies