Firewall integrations

Fortinet

Elevate the power of your Fortinet Fortigate Firewall using by adding our Intelligence.

Palo Alto

Palo Alto Firewalls can be hardened with our threat intelligence as well.

Sophos XGS

Enhance the Sophos XGS Firewall with our threat intelligence.

OPNsense

Enhance your OPNsense Firewall with our threat intelligence using the native plugin.

SIEM integrations

Splunk

Splunk is a great platform, but without the right Threat Intelligence it's just a log server. Try our threat intelligence today. 

Microsoft Sentinel

One of the most used SIEM solutions should be enriched with the right Intelligence. At Q-Feeds you're at the right place!

Other

Luckily there are many other SIEM vendors whom support 3rd party threat intelligence.

Threat Intelligence Portal

Darkweb Monitoring

Darkweb monitoring is one of our services, not only for threat intelligence but also for you most important assets.

Threat Lookup

With Threat Lookup you get full insights in our IOC database, including full MITRE ATT&K mapping.

External Attack Surface Management

A toolset to check your external facing assets exposed on the internet

Vulnerability Scanner

A comprehensive vulnerability scanner which can scan your infrastructure and web applications

Brand Protection

Protect your brand for look-a-likes and potential phishing attempts

Services

TAXII Feeds & Server Software

TAXII/STIX2.1 standard. Both in form of feeds and server software available

Implementation

Need help with implementations? No worries, we have a strong network of partners who are able to help you.

Solutions

Enrich my SIEM

Elevate the power of your SIEM solution using by adding our Intelligence.

Enrich my Firewall

Firewalls can be hardened with our threat intelligence as well.

Prevent phishing

Enhance your protection against phishing

Achieve compliancy

Achieve compliancy by correlating the best threat intelligence to your logs

Futuristic eye design with circuits and geometric shapes.

Company

About

Read here all about Q-Feeds

News and Updates

Cybersecurity news and updates about us

Publications

All of our media coverage in one place

Become a reseller

Strengthen your portfolio with our comprehensive reseller program

Partner locator

Find our certified partners here

Contact

For all your questions or inquiries

Neural network representation of a human brain

Support

My Account

Access your account and manage your licenses

Downloads & Manuals

On this page you find white papers and manuals

Knowledge base

Our knowledge base full of implementation instructions

Start for free

Start your cyber security intelligence journey here

Abstract geometric wireframe human head

Unraveling the Coruna framework: exploring its exploit kit and connections to Operation Triangulation

Mar 26, 2026 | Threat Intelligence Research

Sophisticated Exploit Kit Targets Apple Devices

The recent discovery of the Coruna exploit kit, revealed in reports by Google and iVerify, highlights a significant threat to Apple iPhone users. Initially identified in targeted attacks linked to a surveillance vendor, this toolkit has since been employed in various malicious campaigns, notably in Ukraine and China, leveraging multiple vulnerabilities, including prominent zero-days previously used in Operation Triangulation.

Coruna encompasses a robust exploitation framework rooted in earlier methodologies like those seen in Operation Triangulation. Analysis uncovered that certain attacks utilize updated kernel exploits for vulnerabilities CVE-2023-32434 and CVE-2023-38606. These exploits are crucial as they focus on already patched vulnerabilities, revealing the danger posed to users who may not have applied recent updates.

The attack structure begins with a stager that systematically assesses the browser to select the appropriate exploits for remote code execution. Following the stager’s analysis, a payload initiates exploitation of the kernel. This payload leverages sophisticated file formats for managing encrypted and compressed data, as detailed in the related attack flow diagrams. The first diagram provides a simplified overview of the exploitation chain from Operation Triangulation, whereas the second details the operational steps taken by the Coruna exploit kit.

The internal configuration of Coruna indicates a highly modular design, suggesting potential reuse by various threat actors. With five kernel exploits in its arsenal, the attack toolkit’s architecture highlights its capability for wide deployment, thereby placing unpatched devices at considerable risk.

Defensive Context

Organizations utilizing Apple devices, particularly those operating in high-risk sectors such as cybersecurity, finance, or governmental services, need to be acutely aware of exploit kits like Coruna. The nature of these attacks necessitates vigilance, especially among users who have not carried out timely updates. In contrast, users of older devices or those operating in less targeted environments may have a lower exposure risk.

Why This Matters

This exploit kit signifies a real threat, particularly in environments where users may not consistently apply patches or updates—an operational hazard for organizations reliant on mobile technologies. The potential for widespread exploitation poses problems not only for individual users but also for enterprises whose devices are part of sensitive operations.

Defender Considerations

Given the detailed analysis, monitoring for network behavior consistent with Coruna’s attack patterns could provide defenders with detection opportunities. Reporting or blocking active distribution links identified during the research might mitigate some immediate risks.

Indicators of Compromise (IOCs)

The research does not specify individual IOCs such as IPs, domains, or URLs. Therefore, it is essential for defenders to remain vigilant and gather intelligence on emerging threats related to this exploit kit.

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles