Compromised art-template npm Package Delivers Coruna-Like iOS Exploit

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Key Takeaways
  • Supply Chain Attack: Compromised art-template package versions injected malicious loaders into web environments.
  • Exploit Kit Delivery: The payload targets iOS Safari users via sophisticated watering-hole tactics.
  • Malicious Domain Routing: The campaign utilizes domains like v3.jiathis.com to deliver the framework.

A highly sophisticated package compromise involving art-template, a widely utilized JavaScript templating library originally authored by a developer known as aui, exposed a critical supply chain attack that delivered a Coruna-like iOS Safari exploit framework through a watering-hole attack.

Socket Threat Research detected the compromise on May 20, 2026. The threat actor systematically escalated the attack across multiple iterations of the open-source library. 

Malicious Injection Mechanics

In version 4.13.3, the attackers utilized String.fromCharCode obfuscation to conceal the malicious payload. However, in subsequent versions 4.13.5 and 4.13.6, the attackers abandoned this obfuscation entirely. They opted instead for plaintext loadScript calls that injected a browser-side remote-script loader directly into the lib/template-web.js file.

Full delivery chain | Source: Socket
Full delivery chain | Source: Socket

This targeted injection initiated a precise redirect chain utilizing the domains v3.jiathis.com and utaq.cfww.shop, ultimately connecting victims to a command-and-control server hosted at l1ewsu3yjkqeroy[.]xyz.

The resulting implant functions as a highly specialized exploit delivery mechanism. It exclusively targets users running Safari on iOS versions 11.0 through iOS 17.2. The malicious framework explicitly rejects all other operating systems, desktop environments, and alternative browsers, and alternative browsers, according to Socket.  

Furthermore, the framework implements a hard cutoff that immediately terminates execution on iOS 17.3 and above, preventing deployment on patched systems. 

Vulnerable iOS devices targeted:

Coruna-Like iOS Safari Exploitation

Following their extensive technical analysis, Socket assessed with high confidence that this malicious sample represents the established Coruna exploit kit delivery framework or a very close derivative. The latter contains 5 full exploit chains and 23 individual exploits, targeting iOS 13.0 through 17.2.1.

Coruna defines five WebContent RCE exploit chains, each covering a specific iOS version band,” the report said. The sample's five version-specific payload modules map to these chains with near-perfect alignment:

In March, U.S. contractor Trenchant, the offensive cyber operations division of U.S. defense contractor L3Harris, was linked to the global iPhone hacking toolkit Coruna, which GTIG estimated is currently used by multiple, unrelated threat actors.

Later the same month, a newer version of the DarkSword iPhone exploit kit leaked on GitHub, exposing iOS users to spyware.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: