It takes an average of 277 days to identify and contain a data breach, but for the victims of Operation Triangulation, the silence lasted years. When Kaspersky first noticed anomalous traffic on its corporate Wi-Fi in 2023, they weren't just looking at a minor breach; they were pulling on a thread that would eventually unravel one of the most sophisticated iOS spying campaigns in history. Now, new evidence suggests that the ghost of Triangulation hasn't vanished—it has evolved into a framework known as Coruna.
From a technical standpoint, the discovery of the Coruna exploit framework by Google’s Threat Analysis Group (TAG) and iVerify initially seemed like a separate, albeit concerning, development. Coruna was observed in the wild targeting iPhones through watering-hole attacks in Ukraine and financially motivated campaigns in China. However, behind the scenes, the architectural similarities were too glaring to ignore.
Kaspersky researchers recently obtained and decrypted active Coruna distribution links, and the forensic evidence is striking. One of Coruna’s primary kernel exploits, which leverages CVE-2023-32434 and CVE-2023-38606, is essentially a polished, updated version of the exact same exploit used in the original Operation Triangulation. To put it another way, if Operation Triangulation was a custom-built engine, Coruna is the high-performance successor built in the same factory using the same blueprints.
In practice, Coruna is far more than a simple copy-paste job. While it shares the DNA of its predecessor, it has grown into a multifaceted toolkit. Analysis revealed four additional kernel exploits within the framework that were never seen in the original Triangulation campaign. Curiously, two of these were developed after the details of Operation Triangulation were made public.
This suggests a resilient and proactive development team. Assessing the attack surface, these actors aren't just recycling old tricks; they are actively monitoring the security landscape and engineering new ways to bypass modern iOS defenses. Despite targeting different vulnerabilities, all five exploits in the Coruna kit share a common codebase and a unified kernel exploitation framework. This consistency indicates a systemic development effort rather than a disorganized collection of tools.
From an end-user perspective, there is a common misconception that the "walled garden" of iOS is impenetrable. In reality, the high level of hardware and software integration makes it a premium target for sophisticated APT (Advanced Persistent Threat) actors. When a vulnerability is found at the architectural level, as seen with the hardware-based bypasses in Triangulation, it provides a stealthy and pervasive foothold that is incredibly difficult to detect.
I remember analyzing a similar targeted attack a few years back where the victim was convinced their device was secure simply because they hadn't clicked any suspicious links. The reality of modern zero-click exploits is much more precarious. Like a digital Trojan horse, these exploits arrive via invisible triggers—an iMessage attachment that never triggers a notification or a visit to a compromised but legitimate website. Once inside, the malware acts like a silent squatter, exfiltrating sensitive data while remaining completely invisible to the user.
Looking at the threat landscape, the transition from Operation Triangulation to Coruna highlights a shift toward scalable, modular exploit kits. While Triangulation felt like a bespoke operation, Coruna appears designed for wider distribution across different geographic regions and varying motivations, from state-sponsored espionage to high-level financial crime.
| Feature | Operation Triangulation | Coruna Framework |
|---|---|---|
| Primary Targets | Diplomatic/Government | Ukraine (Watering hole), China (Financial) |
| Core Vulnerabilities | CVE-2023-32434, CVE-2023-38606 | Shared core + 4 new kernel exploits |
| Stealth Level | Extremely High (Zero-click) | High (Watering hole/Targeted) |
| Codebase | Original Prototype | Refined, Modular Evolution |
Essentially, the threat actors have moved from a single mission-critical tool to a robust, reusable platform. This makes the job of incident responders significantly harder, as the indicators of compromise (IoCs) are constantly shifting even if the underlying framework remains the same.
Patching aside, how does one defend against a framework designed to bypass the very foundations of mobile security? From a privacy standpoint, the answer lies in a layered defense strategy. We often talk about the "human firewall," but when dealing with zero-click exploits, the human is often bypassed entirely.
Instead, we must look at security as a series of granular hurdles. For organizations, this means implementing stringent mobile device management (MDM) policies and monitoring for the kind of anomalous network traffic that first tipped off researchers to Triangulation. For individuals, it means embracing a healthy level of paranoia regarding device updates and utilizing features like Apple's Lockdown Mode if you fall into a high-risk category (such as journalists, activists, or government employees).
Ultimately, the link between Coruna and Operation Triangulation serves as a sobering reminder that sophisticated threats rarely disappear; they simply undergo a metamorphosis. The actors behind these tools are well-funded, patient, and technically brilliant. They treat encryption not as a barrier, but as a challenge to be circumvented at the kernel level.
To safeguard your digital perimeter, consider the following actionable steps:
In the world of high-stakes cyber espionage, staying one step ahead isn't just about the software you use—it's about understanding the evolution of the predators in the digital ecosystem.
Sources:



Our end-to-end encrypted email and cloud storage solution provides the most powerful means of secure data exchange, ensuring the safety and privacy of your data.
/ Create a free account