A U.S. military defense contractor has admitted to building sophisticated iPhone hacking tools that were later deployed by Russian espionage operations in Ukraine and Chinese cybercriminals, according to an exclusive TechCrunch investigation. The revelation, which follows Google's discovery of the malware in active operations, raises urgent questions about how American-made cyber weapons ended up in adversarial hands - and whether they leaked, were stolen, or sold through shadowy intermediaries.
Google just dropped a bombshell that's sending shockwaves through the cybersecurity world. The tech giant's threat intelligence team uncovered a series of sophisticated iPhone hacking tools actively deployed by Russian intelligence operatives in Ukraine and a separate Chinese cybercriminal group. But here's the kicker - sources inside a U.S. government defense contractor have now confirmed those tools originated from their own development labs.
The admission, obtained exclusively by TechCrunch, marks a stunning breach in operational security for America's military-industrial complex. It's one thing for nation-state adversaries to develop their own exploits. It's quite another when they're wielding weapons built by U.S. taxpayers for American intelligence operations.
Apple has spent years fortifying the iPhone against exactly these kinds of attacks, touting its hardware security features and encrypted architecture. Yet these tools managed to penetrate those defenses with precision that only comes from deep technical knowledge and substantial resources - the kind typically available to well-funded government contractors.
The discovery ties back to Operation Triangulation, a multi-year espionage campaign that Kaspersky researchers first exposed in 2023. That operation used a chain of zero-day vulnerabilities to compromise iPhones through invisible iMessage exploits, requiring no user interaction whatsoever. Victims simply received a message, and their devices were pwned.
What no one knew until now was where those tools came from. While Kaspersky documented the technical mechanics brilliantly, the origin story remained murky. Google's investigation changed that, identifying code signatures and operational patterns that pointed directly to Western development.












