: The exploit targets the XNU kernel via a vulnerability in the AppleM2ScalerCSCDriver , allowing for arbitrary memory read/write capabilities.
: It leverages a memory corruption flaw and bypasses Pointer Authentication Codes (PAC) to escape the browser's security sandbox.
DarkSword is a "full-chain" exploit framework designed to compromise iPhones and iPads running older versions of iOS 18. Unlike traditional malware that requires a user to download a suspicious app, DarkSword is often delivered via . In these scenarios, attackers compromise legitimate websites—such as news portals or government resources—and inject malicious scripts that automatically infect visitors using the Safari browser. How the Exploit Works
: iMessages, text messages, and call history. Credentials : Stored passwords and Wi-Fi passwords.
Inside DarkSword: A New iOS Exploit Kit Delivered ... - iVerify