Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Google Discloses Apple WebKit Vulnerability: Affects iOS 13~17.2.1, Approximately 42,000 iPhones Become "ATMs"
Google announced today (March 4) that it has released a blog post revealing a jailbreak toolkit codenamed Coruna for iPhones, which can affect models running iOS 13 to 17.2.1. Evidence indicates that this toolkit has already fallen into the hands of foreign spies and cybercriminals.
Google states that the Coruna toolkit is currently effective only on iOS versions 13.0 (released September 2019) through 17.2.1 (released December 2023), and Apple has patched the vulnerabilities in iOS 18.
The Coruna toolkit includes five complete iOS exploit chains, totaling 23 exploits. Its core value lies in integrating multiple undisclosed exploit techniques and bypass measures.
According to a blog post cited by IT Home, the Google Threat Intelligence Group (GTIG) discovered the following:
Technically, the Coruna toolkit uses JavaScript frameworks for device fingerprinting, then delivers WebKit remote code execution (RCE) exploits and pointer authentication code (PAC) bypass attacks.
The final payload, called “PlasmaLoader” (tracked by GTIG as PLASMAGRID), injects into system processes and scans devices for cryptocurrency wallet apps (such as MetaMask, Trust Wallet), stealing mnemonics and private keys.
Data shows that approximately 42,000 devices have been compromised in profit-driven attacks, used to steal cryptocurrencies and private data. Code analysis indicates that the core development is highly professional, likely by a single author.
In response to this threat, Google has added all related websites and domains to the “Safe Browsing” blocklist. GTIG emphasizes that the Coruna toolkit cannot breach the latest versions of iOS. Therefore, iPhone users should immediately update their devices to the latest iOS version to eliminate the risk.