Google has identified an advanced cyberattack targeting iPhone devices, according to an analysis published by its Threat Analysis Group. The finding has drawn attention due to its technical sophistication, but experts emphasize that the operation appears to be highly targeted rather than a mass threat affecting millions of users.
According to the report published on Google Cloud’s official platform, the attack is linked to an exploit toolkit known as “CORUNA”, which uses a chain of vulnerabilities within Apple’s iOS operating system to gain control over a victim’s device. These vulnerabilities include so-called “zero-day” flaws, which are particularly dangerous because they are unknown to the vendor at the time of exploitation.
The report does not indicate a widespread global campaign or suggest that large numbers of users are at immediate risk. Instead, experts say the attack has been deployed in limited, targeted operations, often associated with cyber-espionage or the collection of sensitive information.
Apple has addressed the identified vulnerabilities through iOS security updates. As is standard practice, the company typically withholds detailed disclosure until patches are released, in order to reduce the risk of further exploitation.
Google’s analysis indicates that the attack leveraged a technique known as a “watering hole”, in which attackers compromise legitimate websites and use them to silently infect visitors. In such cases, infection can occur simply by visiting a compromised page, without requiring downloads or direct user interaction, making detection particularly challenging.
However, such operations are rarely aimed at the general public. Similar attacks in the past have targeted journalists, activists, government officials, and other high-profile individuals, suggesting that this campaign may also be part of a broader espionage effort.
Security experts note that, despite its technical complexity, this type of attack requires significant resources and expertise, which limits its use primarily to state-linked actors or highly organized groups.
At the same time, the lack of evidence pointing to mass exploitation means that everyday iPhone users are unlikely to be directly affected. Nonetheless, the case underscores the importance of maintaining basic cybersecurity practices.
Key recommendations include installing the latest iOS updates, avoiding suspicious or untrusted websites, and ensuring devices are running supported software versions. These steps remain the first line of defense against most cyber threats.
The discovery also reflects a broader trend in the technology sector: the increasing sophistication of attacks targeting mobile devices. As smartphones store more personal, financial, and sensitive data, they have become increasingly attractive targets for advanced threat actors.
In this context, collaboration between major technology companies and the cybersecurity community remains essential in identifying and mitigating such threats. The CORUNA case highlights that even the most secure systems can contain vulnerabilities, but also demonstrates that detection and response capabilities continue to improve.

