Address
304 North Cardinal St.
Dorchester Center, MA 02124
Work Hours
Monday to Friday: 7AM - 7PM
Weekend: 10AM - 5PM
Address
304 North Cardinal St.
Dorchester Center, MA 02124
Work Hours
Monday to Friday: 7AM - 7PM
Weekend: 10AM - 5PM
When most people think of iPhone hacking, they imagine shadowy government agencies targeting dissidents and journalists. Tools like Pegasus (from NSO Group) have made headlines for years, but those capabilities typically come with a price tag in the hundreds of thousands of dollars per target and are reserved for nation‑state actors.
But the landscape just shifted. Dramatically.
A newly discovered iPhone hacking tool called DarkSword has been found in the wild—and unlike its predecessors, it’s capable of compromising hundreds of millions of iPhones at once. Even more alarming: the code was left fully exposed on infected websites, complete with helpful English comments, essentially handing anyone with basic technical skills the keys to silently take over any iPhone running iOS 18.
For those of us who operate in the shadows—providing strategic intelligence, competitive advantage, and yes, the kind of digital leverage that changes outcomes—this is a watershed moment.
For years, the market for iPhone zero‑days was tightly controlled. Brokers like Operation Zero (a Russian firm now sanctioned by the US government) sold these capabilities to governments and select private entities. The tools were expensive—often $1 million or more for a reliable exploit chain—and their use was carefully managed to avoid detection.
But the recent disclosure of two separate hacking toolkits—Coruna and now DarkSword—reveals a different reality. According to researchers from Google, iVerify, and Lookout, DarkSword was used by Russian state‑sponsored hackers, but also by a Turkish surveillance firm (PARS Defense) and hackers operating in Saudi Arabia, Malaysia, and beyond. The tool was embedded in compromised Ukrainian websites (news outlets and a government agency site) where it would silently infect any visitor’s iPhone.
Unlike traditional spyware, DarkSword uses a fileless, “smash‑and‑grab” technique. It hijacks legitimate iOS processes, extracts passwords, photos, iMessage/WhatsApp/Telegram logs, browser history, calendar data, and even cryptocurrency wallet credentials—then disappears after a reboot, leaving almost no forensic traces.
At revenge.agency, we are frequently approached by clients who need to level the playing field. Whether it’s a business competitor whose tactics cross into illegality, an individual seeking to expose wrongdoing, or a company that suspects internal sabotage, the ability to obtain decisive digital intelligence has always been the domain of governments—until now.
The appearance of DarkSword—and the reckless way its creators left it exposed—means that tools once reserved for elite spies are now more accessible. But let’s be clear: a reliable, targeted operation still commands a six‑figure investment. While the raw exploit code is public, turning it into a surgical, undetectable campaign requires expertise, infrastructure, and careful operational security. That expertise doesn’t come cheap.
Historically, acquiring a reliable iPhone exploit chain cost $500,000 to $2 million. Pegasus was sold on a per‑target basis, with prices often exceeding $600,000 for a full package. The economics kept these tools out of reach for all but the most well‑funded governments and contractors.
The broker model—exemplified by Operation Zero—changed that, bringing prices down into the low six figures for a fully operational chain. DarkSword’s leaked code further reduces the barrier for those who already possess the technical capacity to weaponize it. But for a client looking for a guaranteed, stealthy result, the cost remains six figures—typically a fraction of what the old guard charged, but still a serious investment.
We are asked about pricing constantly. Prospects want detailed breakdowns of our capabilities, our sources, our methods. We understand the curiosity. But we’ve learned the hard way: copycats and competitors try to use us for free expertise. So unless you’ve paid a retainer, we don’t get into specifics. Serious clients know how this works.
At revenge.agency, we don’t just monitor these developments—we operationalize them. Our network includes specialists who understand the technical architecture of tools like DarkSword, Coruna, and their predecessors. We can:
We operate with discretion, precision, and a clear understanding of the legal boundaries that define our work. Our clients come to us when conventional methods fail—and they leave with results that change the game.
The era of iPhone hacking as a rare, expensive, and highly targeted tool is over. DarkSword has shown that mass exploitation is not only possible—it’s already happening. Russian spies, Turkish surveillance firms, and cybercriminals are using it. The code is public, but the expertise to deploy it reliably is not.
If you need to gain digital intelligence on a competitor, verify the integrity of a partner, or protect yourself from the new wave of indiscriminate attacks, revenge.agency is ready.
Contact us. We’ll discuss your objectives and how our capabilities can achieve them—after the retainer.