On March 18 (U.S. Pacific Time), researchers from Google, iVerify, and Lookout announced that a powerful exploit targeting Apple’s iPhone had been planted on multiple Ukrainian websites. The exploit chain has been named “DarkSword,” and it represents a serious example of modern cyber warfare techniques.
Let’s break down what happened — and learn the Japanese used to describe it.
A “Watering Hole” Attack Using DarkSword
The researchers reported that attackers modified legitimate government and news websites in Ukraine. Into these trusted sites, they secretly embedded malicious invisible code — a method known as a “watering hole attack.”
In Japanese cybersecurity terminology, this attack chain is called an エクスプロイト (ekusupuroito) — exploit code that takes advantage of security weaknesses.
When users accessed these compromised sites on vulnerable iPhones, the attack triggered automatically. The attackers exploited Safari vulnerabilities, and the device was compromised in the バックグラウンド (bakkuguraundo) — in the background — without the user needing to tap or click anything.
This type of attack is described in Japanese as a ゼロクリック攻撃 (zero kurikku kōgeki), meaning a “zero-click attack.”
Unlike phishing scams that require user action, this method required virtually no interaction. Simply visiting the site was enough.
Who Is Behind the Attack?
The group responsible for the attacks in Ukraine is believed to be a threat actor known as “UNC6353.” In Japanese reports, a threat actor is called an アクター (akutā).
This group is said to be linked to Russia. The article states:
- ロシアの関与が疑われるアクターとされている。 Roshia no kan’yo ga utagawareru akutā to sarete iru. “It is considered to be a threat actor suspected of Russian involvement.”
Notice the grammar pattern 〜とされている (to sarete iru), which we’ll examine later.
The same group reportedly used another iPhone hacking toolset called “Coruna” in previous attacks against Ukrainian users.
Google’s investigation also confirmed that DarkSword was used not only in Ukraine but in countries such as Saudi Arabia, Turkey, and Malaysia. It was used by multiple different threat actors, including commercial surveillance ベンダー (bendā — vendors).
In the article, this is expressed as:
- 利用されていることが確認された。 Riyō sarete iru koto ga kakunin sareta. “It was confirmed that it is being used.”
What Was the Attack Trying to Steal?
Researchers believe the primary targets were:
- Passwords
- Message histories
- Photos
- Cryptocurrency wallet data
The attackers reportedly stole data within seconds to minutes, then deleted their own files to erase evidence — a “hit-and-run” approach.
The article suggests the purpose was both Russian intelligence activity and financial gain.
Affected iOS Versions and Security Updates
DarkSword mainly targeted devices running iOS versions 18.4 through 18.6.2.
However, Apple has already fixed the exploited vulnerabilities through recent security パッチ (pacchi — patches).
Researchers strongly recommend that all iPhone users:
- Install the latest アップデート (appudēto — update)
- Upgrade to iOS 18.7.3 or later (or iOS 26.3 or later)
- Replace unsupported devices
Organizations are also urged to remove devices running outdated operating systems.
Cultural Context: Katakana and Cybersecurity in Japanese
Many of the key cybersecurity terms in this article are written in katakana — the script Japanese uses for foreign loanwords.
Words like:
- エクスプロイト
- ゼロクリック
- アクター
- ベンダー
- パッチ
- アップデート
These come directly from English but are adapted to Japanese pronunciation and writing conventions.
Modern Japanese tech reporting is filled with katakana vocabulary. Understanding it is essential if you want to read real Japanese news — especially in IT and cybersecurity fields.
Learn Japanese from This Article
Key Vocabulary
| Japanese | Romaji | Meaning |
|---|---|---|
| エクスプロイト | ekusupuroito | exploit (security attack code) |
| ゼロクリック攻撃 | zero kurikku kōgeki | zero-click attack |
| バックグラウンド | bakkuguraundo | background |
| アクター | akutā | (threat) actor |
| ベンダー | bendā | vendor |
| パッチ | pacchi | patch |
| アップデート | appudēto | update |
| 脆弱性 | zeijakusei | vulnerability |
| 改ざん | kaizan | tampering, alteration |
Grammar Spotlight
1️⃣ 〜とされている
Meaning: “is considered to…,” “is said to…”
Structure: Noun + とされている
Example from the article:
- ロシアの関与が疑われるアクターとされている。 Roshia no kan’yo ga utagawareru akutā to sarete iru. “It is considered to be a threat actor suspected of Russian involvement.”
This structure is often used in news reporting when the statement is based on investigation or expert analysis, rather than direct confirmation.
2️⃣ 〜ことが確認された
Meaning: “It was confirmed that…”
Structure: Clause (plain form) + ことが確認された
Example:
- 利用されていることが確認された。 Riyō sarete iru koto ga kakunin sareta. “It was confirmed that it is being used.”
This is extremely common in Japanese news writing. It makes the tone objective and formal.
Useful Expression
- 最新のiOSバージョンにアップデートする Saishin no iOS bājon ni appudēto suru “To update to the latest iOS version”
You’ll see 最新 (saishin — latest) frequently in tech news.
Continue Learning
Working on your reading skills? Our Katakana Essentials: Adapting Global Words to Japanese lesson is a great next step.
Ready to dive deeper? Our lesson on Reading and Writing in Japanese II: Hiragana and Katakana will help you master these concepts.
Ready to expand your vocabulary even further? Check out Basic Vocabulary Building: Embracing Words Without Latin Ties.
Cybersecurity news like this may sound technical, but it’s actually a goldmine for modern Japanese vocabulary. By reading real reports, you’re learning the language the way it’s used in Japan today — precise, formal, and rich with katakana terminology.
これからもよろしくお願いします。 Kore kara mo yoroshiku onegaishimasu.
