{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreic6o3zfgectrjur3wwbxc45he6bqvfbhk4evendrwro3orvtu7vgm",
    "uri": "at://did:plc:ao3t7cr3n5vz5lhwlje3oied/app.bsky.feed.post/3mg6j4v3rfej2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreibnl6ftnjngyorbczbowummhsgqjncfq7iq36tcu3lbhmo7hvkz3q"
    },
    "mimeType": "image/jpeg",
    "size": 142880
  },
  "path": "/story/coruna-iphone-hacking-toolkit-us-government/",
  "publishedAt": "2026-03-03T19:01:35.000Z",
  "site": "https://www.wired.com",
  "tags": [
    "Security",
    "Security / Cyberattacks and Hacks",
    "Security / Security News",
    "apple",
    "ios",
    "iPhone",
    "Russia",
    "NSA",
    "hacking",
    "malware",
    "cryptocurrency",
    "cybersecurity",
    "security",
    "Wild Thing"
  ],
  "textContent": "A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government.",
  "title": "A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals"
}