[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fz4SPHiJNB6JRPU6kKPl5Qs9Rltkj5GSft2zMjhijXc4":3},{"article":4,"iocs":44},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":29,"category":30,"article_tags":33},"e7ea75fb-2c35-4af3-b57e-8cc6f11c4d67","New C2 infrastructure and lures detected associated with #Coruna and #DarkSword malware. Threat a...","new-c2-infrastructure-and-lures-detected-associated-with-coruna-and-darksword-ma-fcf64a","New C2 infrastructure and lures detected associated with #Coruna and #DarkSword malware. Threat actors are using fake crypto reward scam web pages to deliver malicious URLs and RCE exploits to iOS users. Details at: https:\u002F\u002Ft.co\u002FYCo7obJ4R6 https:\u002F\u002Ft.co\u002Fr5IOX5olE5","Threat actors behind Coruna and DarkSword malware have established new command-and-control infrastructure and are distributing malicious URLs through fake cryptocurrency reward scam pages. The campaign targets iOS users with remote code execution exploits, combining social engineering with platform-specific vulnerabilities.","Coruna and DarkSword malware operators deploy new C2 infrastructure using fake crypto reward lures targeting iOS.",null,"https:\u002F\u002Fx.com\u002FUnit42_Intel\u002Fstatus\u002F2051782054409355499","https:\u002F\u002Fpbs.twimg.com\u002Fmedia\u002FHHlk2ZHXoAQzbu7.png","2026-05-05T21:52:16+00:00","2026-05-05T22:00:08.143576+00:00",8,[18,21,23,26],{"name":19,"type":20},"Coruna operators","threat_actor",{"name":22,"type":20},"DarkSword operators",{"name":24,"type":25},"iOS","product",{"name":27,"type":28},"Command-and-control (C2)","technology","e7b231c8-5f79-4465-8d38-1ef13aea5a14",{"id":29,"icon":11,"name":31,"slug":32},"Threat Intelligence","threat-intelligence",[34,39],{"category":35},{"id":36,"icon":11,"name":37,"slug":38},"574f766a-fb3f-487c-8d2c-0720ae75471b","Zero-day","zero-day",{"category":40},{"id":41,"icon":11,"name":42,"slug":43},"89f78b1c-3503-45a1-9fc7-e23d2ce1c6d5","Malware","malware",[45,48],{"type":43,"value":46,"context":47},"Coruna","Malware family with new C2 infrastructure detected",{"type":43,"value":49,"context":47},"DarkSword"]