{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreic6o3zfgectrjur3wwbxc45he6bqvfbhk4evendrwro3orvtu7vgm",
"uri": "at://did:plc:ao3t7cr3n5vz5lhwlje3oied/app.bsky.feed.post/3mg6j4v3rfej2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreibnl6ftnjngyorbczbowummhsgqjncfq7iq36tcu3lbhmo7hvkz3q"
},
"mimeType": "image/jpeg",
"size": 142880
},
"path": "/story/coruna-iphone-hacking-toolkit-us-government/",
"publishedAt": "2026-03-03T19:01:35.000Z",
"site": "https://www.wired.com",
"tags": [
"Security",
"Security / Cyberattacks and Hacks",
"Security / Security News",
"apple",
"ios",
"iPhone",
"Russia",
"NSA",
"hacking",
"malware",
"cryptocurrency",
"cybersecurity",
"security",
"Wild Thing"
],
"textContent": "A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government.",
"title": "A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals"
}