{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreidahtogb2dt53fxx7nqzyx4fiq7vf7yizx4kt2e7yu56sigmqzxnq",
"uri": "at://did:plc:haakkg7y3xdghcdmprxeexso/app.bsky.feed.post/3mhfnu4vj65r2"
},
"path": "/t/the-proliferation-of-darksword-ios-exploit-chain-adopted-by-multiple-threat-actors/36391#post_1",
"publishedAt": "2026-03-19T08:43:39.000Z",
"site": "https://discuss.privacyguides.net",
"tags": [
"Google Cloud Blog",
"The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat...",
"https://xcancel.com/ryanaraine/status/2034338701430661352#m"
],
"textContent": "Google Cloud Blog\n\n### The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat...\n\nDarkSword is a new iOS exploit chain that leverages multiple zero-day vulnerabilities to fully compromise iOS devices.\n\nhttps://xcancel.com/ryanaraine/status/2034338701430661352#m\n\nTweet:\n\n> Two full iOS exploit kits in one month, deployed via watering holes on public websites, potentially affecting hundreds of millions of devices. Will Apple acknowledge that this no longer fits the “very small number of highly targeted individuals” narrative?\n\nOther info:\n\n> DarkSword supports iOS versions 18.4 through 18.7\n\n> This suggests that UNC6748 didn’t have an exploit chain for Chrome at the time of this activity.",
"title": "The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors"
}