<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[(jamf.com) DarkSword Leaked: Inside a Government-Grade iOS Safari Exploit Kit and Its Implications for the Mobile Threat Landscape]]></title><description><![CDATA[<p>(jamf.com) DarkSword Leaked: Inside a Government-Grade iOS Safari Exploit Kit and Its Implications for the Mobile Threat Landscape</p><p>DarkSword, a government-grade iOS exploit kit, has leaked—enabling one-click RCE with sandbox escape on iOS 18.4–18.6.2. Source code exposure lowers the barrier for skilled attackers, expanding risk beyond elite operators.</p><p>In brief - A sophisticated iOS exploit framework, DarkSword, has been leaked, exposing unpatched iPhones to remote code execution and sandbox escape. Originally used against high-value targets, its public availability now threatens broader exploitation, including cryptocurrency theft.</p><p>Technically - DarkSword leverages JavaScript engine primitives (addrof/fakeobj) to achieve memory read/write, followed by a 100-step mitigation bypass to disable garbage collection and exploit mediaplaybackd for kernel access. The leaked build supports 28 devices across 26 firmware versions, includes debug artifacts, and targets cryptocurrency wallets. A commented-out 'startSandworm' function hints at prior kernel exploit reuse, while MIG message filtering bypasses reflect adaptation to iOS 18.4+ defenses.</p><p>Source: <a href="https://www.jamf.com/blog/darksword-ios-exploit-kit-three-lessons-mobile-security/" rel="nofollow noopener"><span>https://www.</span><span>jamf.com/blog/darksword-ios-ex</span><span>ploit-kit-three-lessons-mobile-security/</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" rel="tag">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/e3f0438b-1880-4fc6-86fe-790ab873ba5e/jamf.com-darksword-leaked-inside-a-government-grade-ios-safari-exploit-kit-and-its-implications-for-the-mobile-threat-landscape</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 08:42:50 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/e3f0438b-1880-4fc6-86fe-790ab873ba5e.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 22 Apr 2026 14:10:29 GMT</pubDate><ttl>60</ttl></channel></rss>