Coruna Jailbreak 

iOS 13 to iOS 17.2.1

Go



Coruna Jailbreak: The Powerful iOS Exploit Framework Explained

Introduction

Coruna Jailbreak (also called CryptoWaters) is a sophisticated iOS exploit framework discovered by the Google Threat Intelligence Group. It targets older versions of the Apple iOS operating system and uses multiple vulnerabilities to gain deep access to iPhones and iPads.

Unlike traditional jailbreak tools designed for customization, Coruna is a spyware-grade exploit kit used in cyber-espionage and large-scale cyber attacks. Security researchers say it contains a collection of powerful exploits capable of bypassing Apple's security protections.


What is Coruna Jailbreak?

Coruna Jailbreak is a multi-exploit attack framework that allows attackers to compromise iOS devices by chaining several vulnerabilities together.

The exploit kit includes:

5 complete iOS exploit chains

23 total vulnerabilities

Support for iOS 13 to iOS 17.2.1

Once successfully executed, the exploit chain can provide attackers with jailbreak-level access to the device, allowing them to run malicious code or install spyware.


How Coruna Exploit Kit Works

Coruna operates through a carefully engineered exploit process designed to automatically adapt to the victim’s device.

1. Device Fingerprinting

The attack begins when a user visits a compromised or malicious website.

A hidden JavaScript framework collects information such as:

iPhone model

iOS version

Device environment

Browser information

This process helps the exploit kit decide which vulnerability to use.

2. Selecting the Right Exploit

After identifying the device, the framework loads a specific exploit chain that works with that particular iOS version.

This makes the attack more effective because different iOS versions require different vulnerabilities.

3. WebKit Remote Code Execution

Many attacks in the framework target the WebKit browser engine used by Safari.

One major vulnerability used was:

CVE-2024-23222

This bug allowed attackers to execute malicious code remotely after the victim opened a compromised webpage.

4. Security Protection Bypass

Modern iPhones have strong security protections. Coruna bypasses these protections using advanced exploitation techniques such as:

Pointer Authentication Code (PAC) bypass

Memory corruption exploitation

Kernel-level privilege escalation

These techniques allow attackers to move deeper into the system.

5. Full System Control

Once the exploit chain is completed, attackers can gain deep system privileges, similar to a jailbreak.

This level of access may allow them to:

Install spyware

Monitor user activity

Access messages and files

Track device data



Exploits Included in Coruna

Researchers discovered 23 exploits inside the Coruna framework.

Some of the major vulnerabilities include:

CVE-2024-23222 – WebKit type confusion vulnerability

CVE-2022-48503 – iOS system security flaw

CVE-2023-43000 – WebKit use-after-free vulnerability

These vulnerabilities allowed attackers to target multiple iOS versions effectively.


Which iPhones Are Affected?

The exploit kit targets devices running:

iOS 13

iOS 14

iOS 15

iOS 16

iOS 17 up to 17.2.1

Devices running newer updates are protected.


Apple Security Fixes

Apple patched the critical vulnerability used in Coruna in:

iOS 17.3

iPadOS 17.3

iOS 16.7.5

iPadOS 16.7.5

Installing the latest updates blocks the exploit chain used by the framework.



How to Protect Your iPhone

To reduce the risk from exploit kits like Coruna:

Keep iOS Updated

Install the latest version of Apple iOS to ensure all security patches are applied.

Avoid Suspicious Websites

Many attacks rely on compromised or fake websites.

Use Security Features

Enable iPhone security protections such as:

Lockdown Mode

Automatic updates

Safe browsing practices

Be Careful with Unknown Links

Phishing links are often used to redirect victims to malicious exploit sites.



Conclusion

Coruna Jailbreak is not a typical jailbreak tool used by iPhone enthusiasts. Instead, it is a highly advanced exploit framework designed for cyber espionage and large-scale attacks.

Discovered by the Google Threat Intelligence Group, the framework includes dozens of vulnerabilities capable of bypassing Apple’s security protections on older iOS versions.

While the exploit is powerful, keeping your device updated with the latest iOS security patches can effectively protect against it.

As exploit kits like Coruna continue to evolve, cybersecurity experts warn that mobile threats are becoming more sophisticated and widespread.