The iOS 18 DarkSword patch represents Apple’s urgent response to one of the most dangerous iPhone exploit chains discovered in months. DarkSword is a sophisticated attack framework that chains multiple vulnerabilities together to steal data from unpatched iPhones, and it is actively being used by state-linked threat actors targeting users worldwide.
Key Takeaways
- DarkSword targets iOS 18.4 through 18.6.2 using JavaScriptCore JIT vulnerabilities triggered via malicious web links
- Apple has released patches in iOS 18.7.3 and 26.3, with the latest security update at iOS 18.7.6 or 26.3.1
- Attacks are non-targeted and spread through compromised websites and watering holes, affecting potentially hundreds of millions of unpatched devices
- The exploit chain deploys malware families including GHOSTBLADE, GHOSTKNIFE, and GHOSTSABER for data exfiltration
- Users running iOS 15 or 16 receive protection through backported patches; iOS 13 and 14 users must upgrade to iOS 15 minimum
What is the iOS 18 DarkSword patch and why does it matter?
The iOS 18 DarkSword patch closes a chain of critical vulnerabilities that allow attackers to compromise iPhones through a single malicious link. Unlike targeted spear-phishing attacks, DarkSword spreads through watering hole campaigns—compromised websites that infect any visitor with outdated iOS versions. Once a user clicks a malicious link or visits an infected website, the attack chain executes in stages: first gaining remote code execution through Safari, then escalating privileges to escape the sandbox and steal sensitive data.
Apple’s security team identified DarkSword being actively exploited by threat actors including UNC6353, a Russian espionage group, alongside other actors like UNC6748 and PARS Defense. The malware families deployed—GHOSTBLADE, GHOSTKNIFE, and GHOSTSABER—install in-memory implants designed to exfiltrate data without leaving obvious traces on the device. This is not a theoretical threat; security researchers discovered the exploit kit through operational security failures in real-world attacks, confirming active campaigns targeting iPhone users.
Which iOS versions are vulnerable to DarkSword?
DarkSword primarily targets iOS versions 18.4 through 18.6.2, exploiting specific JavaScriptCore JIT vulnerabilities that were patched in later releases. The attack uses a type confusion bug in JIT RegExp matching for iOS 18.4 and 18.5, while iOS 18.6 through 18.6.2 are vulnerable to a use-after-free flaw in the JIT StoreBarrierInsertionPhase. However, the vulnerability chain extends beyond iOS 18 to older devices running iOS 13 through 18.6.2, meaning millions of users with older iPhones remain at risk.
Apple’s response includes patches rolled out across multiple iOS versions. Users should update to iOS 18.7.6 or iOS 26.3.1 for complete protection. For older devices, Apple has backported patches to iOS 15 and iOS 16, ensuring protection even for users who cannot upgrade to the latest version. Users still running iOS 13 or 14 must upgrade to at least iOS 15 to receive DarkSword protections.
How does the iOS 18 DarkSword exploit chain work?
The DarkSword attack unfolds in six distinct stages, each exploiting a different system component. The chain begins when a user clicks a malicious link or visits a compromised website, triggering a JavaScriptCore JIT vulnerability in Safari’s renderer. This initial exploit grants remote code execution within Safari’s sandbox. The attacker then develops what security researchers call fakeobj and addrof primitives—techniques that allow arbitrary memory reads and writes, giving them control over the device’s memory.
From there, DarkSword chains two additional vulnerabilities: CVE-2025-43529, a DFG JIT garbage collection bug, and CVE-2026-20700, a dyld Pointer Authentication Code (PAC) bypass. These vulnerabilities allow the attacker to escape the sandbox—the security boundary that normally isolates Safari from the rest of the system—and escalate privileges to system level. Once at this level, the malware installs an in-memory implant that exfiltrates sensitive data without writing to disk, making it harder for users to detect. Finally, the implant loads the final payload: GHOSTBLADE, GHOSTKNIFE, or GHOSTSABER, depending on the attacker’s objectives.
What makes DarkSword particularly dangerous is that it requires only a single click. Users do not need to fall for social engineering beyond visiting a compromised website or clicking a link in a message. According to Apple’s security guidance, users running outdated iOS versions face immediate risk: if you click a malicious link or visit a compromised site on an unpatched device, the data on your iPhone might be stolen.
How does DarkSword compare to other iOS exploit kits?
DarkSword is the second major iOS exploit kit discovered in rapid succession, following the Coruna exploit kit, which targeted similar iOS versions through identical attack vectors. Both use watering hole campaigns rather than targeted phishing, both chain multiple vulnerabilities for sandbox escape and privilege escalation, and both are used by overlapping threat actor groups. The discovery of two sophisticated exploit kits in one month signals an escalation in iOS targeting by state-linked actors.
The key difference lies in deployment: while Coruna was discovered earlier, DarkSword has already spread across multiple threat actors, suggesting faster proliferation and broader adoption in the attacker community. Older devices running iOS 13 remain vulnerable to neither exploit unless they upgrade to iOS 15, creating a two-tier risk landscape where millions of older iPhones face exposure to both kits simultaneously.
Who should update first, and what protections already exist?
Everyone with an iPhone should update immediately, but the priority order matters. Users on iOS 18.4 through 18.6.2 face the highest risk and should update to iOS 18.7.6 without delay. Users on iOS 17 and earlier versions should also update, though iOS 17 is less directly targeted by DarkSword’s primary vulnerabilities. Apple’s Safe Browsing feature provides a secondary defense by blocking known malicious URLs, reducing the likelihood of accidental clicks on infected sites.
Two specific protections already mitigate DarkSword: Lockdown Mode, Apple’s hardened security posture for high-risk users, is ineffective against DarkSword and offers no additional safety. However, iPhone 17 devices with Memory Integrity Enforcement (MIE) are protected against the exploit chain. For users unable to update immediately, avoiding clicking links from untrusted sources and not visiting unfamiliar websites provides some practical defense, though it is not a substitute for patching.
How do I update my iPhone to patch DarkSword vulnerabilities?
Updating your iPhone is straightforward and free. Go to Settings, tap General, then select Software Update. Your device will check for available updates and prompt you to install the latest version. Apple is pushing a Critical Security Update alert to all users, making the update highly visible. The entire process typically takes 10-15 minutes depending on your internet connection and device model.
Does updating to the iOS 18 DarkSword patch affect performance or battery life?
Security patches typically have minimal impact on performance or battery life. The iOS 18 DarkSword patch focuses on closing specific vulnerabilities without introducing new features or major system changes. Your device should run exactly as it did before the update.
What if my iPhone is too old to receive the iOS 18 DarkSword patch?
If you are running iOS 13 or 14, you must upgrade to at least iOS 15 to receive DarkSword protections. If your device cannot run iOS 15 or later, it cannot be patched against this specific exploit chain. In that case, avoid clicking links from unknown sources and consider upgrading to a newer device if you handle sensitive data regularly.
The iOS 18 DarkSword patch is not optional—it is a critical security update that closes active exploits being weaponized against real users right now. State-linked actors are actively deploying this malware through watering hole attacks, meaning any unpatched iPhone is a potential target. Update today, and encourage friends and family to do the same.
This article was written with AI assistance and editorially reviewed.
Source: TechRadar


