Rules from EXP DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform

Report Type

Threat Intelligence Assessment

Threat Category

Exploit Framework Activity
Multi-Stage Exploitation Chain
Client-Side Exploitation and Malware Delivery

Assessment Date

March 24, 2026

Primary Impact Domain

Endpoint Security (iOS / Mobile Platform)
Exploit Chain Execution and Detection Evasion
Device-Level Trust Boundaries and Telemetry Visibility

BLUF

‍S2 BLUF – Recommended Executive-Grade Summary

 The DarkSword exploit framework presents a material business risk by enabling full-chain device compromise that can lead to covert surveillance, credential theft, and exposure of sensitive or regulated data through downstream malware deployment. The technical cause is a multi-stage exploit chain that leverages vulnerability exploitation to achieve initial access, privilege escalation, and controlled payload delivery within targeted environments. Current threat posture indicates elevated operational risk because exploit chaining can limit early observable indicators and create a direct path from vulnerability exposure to malware delivery. Executive action should prioritize platform hardening, accelerated vulnerability remediation, and deployment of behavior-based detection across endpoint and network telemetry.

‍ ‍

S2A Executive Risk Translation

‍ ‍

If vulnerable platforms or applications remain exposed, DarkSword can achieve full device compromise and silently deliver malware, increasing the likelihood of undetected access to sensitive data, persistent surveillance, and sustained operational impact.

‍ ‍

S3 Why This Matters Now

DarkSword reflects the increasing use of exploit frameworks that combine multiple vulnerabilities into a single execution chain capable of bypassing platform security layers and exploit mitigation controls. These frameworks target mobile operating systems, device components, and application layers where remediation delays, software fragmentation, and exposure conditions create exploitable gaps. The ability to move directly from exploitation to payload delivery creates a compressed attack path from vulnerability exposure to persistent compromise with minimal detection opportunity.

‍ ‍S25 Ultra-Tuned Detection Engineering Rules

Implementation Integrity Statement
S25 is considered complete when each platform is written to its maximum truthful detection strength and real-world deployability constraints are embedded directly in the rule fields. Differences in platform visibility or telemetry depth do not constitute a framework failure when those constraints are explicitly documented and the rule remains threat-specific, phase-pure, and operationally honest.

Suricata

Deployment Status

Conditionally Deployable

Corroborating Only
Rule Name

DarkSword iOS Repeated Non-Approved DNS Burst Corroborator

Purpose

Provide low-noise network corroboration for suspected DarkSword exploit-trigger windows by identifying repeated DNS queries from iOS-managed traffic to non-approved destinations.
ATT&CK Technique
T1203 – Exploitation for Client Execution

Telemetry Dependency

Suricata DNS telemetry
Reliable iOS device attribution through subnet segmentation, NAC tagging, or equivalent source identity mapping
Maintained allowlists for Apple infrastructure, MDM services, enterprise proxy infrastructure, enterprise security tooling, and sanctioned mobile application dependencies
This rule is not deployable as intended in environments where iOS traffic cannot be distinguished from general user traffic.

Network activity in this rule is limited to immediate post-instability onset and is used strictly as Phase 1 corroboration, not as post-exploitation communication detection.

Tuning Explanation

This rule is intentionally constrained to a corroborating role because DarkSword Phase 1 activity is primarily device-side and WebKit-driven. It is tuned to remain low-noise by limiting scope to attributed iOS-managed traffic and excluding known benign mobile infrastructure. If iOS attribution or allowlist maturity is weak, the rule should be disabled or downgraded rather than broadened into a generic DNS burst analytic.

Detection Logic

Trigger when a single attributed iOS source performs six or more DNS queries to non-approved destinations within 120 seconds.

Operational Context

Use only as a low-confidence supporting signal that is correlated with repeated WebKit instability or abnormal post-crash behavior from the same device population. This rule must not be used as a standalone exploit detector or as a high-severity alert trigger.

 

var IOS_NETS [10.50.0.0/16,10.51.0.0/16]
var APPROVED_MOBILE_DESTS [17.0.0.0/8,52.96.0.0/12,13.107.6.0/24]

alert dns $IOS_NETS any -> !$APPROVED_MOBILE_DESTS any (
    msg:"CYBERDAX DarkSword iOS repeated non-approved DNS burst corroborator";
    dns.query;
    threshold:type both, track by_src, count 6, seconds 120;
    classtype:policy-violation;
    metadata:attack_target Mobile_Device, confidence Low, role Corroborating;
    sid:2542101;
    rev:9;
)
Deployment Status

Conditionally Deployable
Corroborating Only

Rule Name
DarkSword iOS Early TLS Session Burst Corroborator

Purpose

Identify tightly grouped outbound TLS session initiation from iOS-managed traffic during suspected exploit-trigger windows.

ATT&CK Technique
T1203 – Exploitation for Client Execution

Telemetry Dependency

Suricata TLS metadata
Reliable iOS device attribution through subnet segmentation, NAC tagging, or equivalent source identity mapping
Maintained allowlists for Apple, MDM, enterprise proxy, enterprise security tooling, and sanctioned mobile application infrastructure
This rule is not deployable as intended where mobile traffic cannot be attributed with reasonable confidence.

Tuning Explanation

This rule remains corroboration-only because benign iOS devices regularly generate TLS activity. It is tuned to reduce false positives by requiring grouped session onset and by excluding common benign destinations. If destination filtering and iOS attribution are not operationally mature, this rule should be disabled instead of being widened into a generic TLS burst detector.

Detection Logic
Trigger when the same attributed iOS source initiates three or more outbound TLS sessions to non-approved destinations within 180 seconds.

Operational Context

Use only alongside device-side instability analytics or same-device correlation in a SIEM. This rule is intended to strengthen confidence in a suspected exploit window, not to independently identify DarkSword exploitation.

alert tls $IOS_NETS any -> !$APPROVED_MOBILE_DESTS any (
    msg:"CYBERDAX DarkSword iOS TLS burst corroborator";
    flow:established,to_server;
    threshold:type both, track by_src, count 3, seconds 180;
    classtype:trojan-activity;
    sid:2542102;
    rev:9;
)

SentinelOne

Deployment Status

Conditionally Deployable

Rule Name

DarkSword Repeated WebKit Crash Threshold

Purpose

Detect exploit-trigger instability via repeated WebKit or Safari crash behavior on the same iOS device.

ATT&CK Technique
T1203 – Exploitation for Client Execution

Telemetry Dependency

Normalized iOS crash telemetry ingested into SentinelOne or a validated connected analytics pipeline
Stable device identifier
Normalized naming for MobileSafari, SafariViewService, or WebKit-linked crash context
This rule is not deployable in environments where SentinelOne does not actually receive normalized mobile crash telemetry.

Tuning Explanation

This rule is valid only where iOS crash telemetry is present and normalized. It is not acceptable to emulate this logic using desktop-oriented browser crash or generic process telemetry. Tuning relies on repeated crash behavior inside a five-minute interval and assumes lab, QA, and crash-test populations are tagged and excluded.

Detection Logic

Trigger when three or more WebKit- or Safari-linked crash events occur on the same device within five minutes.

Operational Context

Use only in environments with validated mobile crash ingestion. If the telemetry source is absent or inconsistent, mark the rule not deployable rather than degrading it into a generic browser-instability detector.

EventType = "MobileCrash"
AND (
  AppName RegExp "(?i)(MobileSafari|SafariViewService|WebKit)"
)
| group by DeviceId, bin(Time, 5m)
| where count() >= 3
AND NOT DeviceTag IN ("MobileQALab","CrashTest","MDMValidation")

Deployment Status

Conditionally Deployable

Rule Name

DarkSword Crash-to-Abnormal-Recovery Correlation

Purpose

Detect exploit progression by correlating repeated crash behavior with abnormal recovery behavior on the same iOS device.

ATT&CK Technique
T1203 – Exploitation for Client Execution

Telemetry Dependency

Normalized iOS crash telemetry
Normalized mobile abnormal recovery or execution-anomaly telemetry
Stable device identifier across both telemetry streams
This rule is not deployable in environments where post-crash anomaly telemetry is absent or unreliable.

Tuning Explanation

This rule remains Phase 1 pure because it focuses on exploit-trigger progression immediately following instability and does not depend on payload or communication telemetry. It is tuned to require both repeated crash behavior and one abnormal recovery-type event in the same bounded interval. If abnormal recovery telemetry is not present, this rule should not be forced into production as a partial substitute.

Detection Logic

Trigger when three or more WebKit- or Safari-linked crash events are followed by at least one abnormal recovery or execution-anomaly event on the same device within five minutes.

Operational Context

Use only where both crash telemetry and abnormal recovery telemetry are available from mobile sources and normalized to the same device identity. This is the higher-confidence SentinelOne Phase 1 analytic only in those environments.

(
  EventType = "MobileCrash"
  AND AppName RegExp "(?i)(WebKit|Safari)"
)
| group by DeviceId, bin(Time, 5m)
| where count() >= 3
| join (
    EventType = "MobileRecoveryAnomaly"
    | group by DeviceId, bin(Time, 5m)
) on DeviceId

Splunk

Deployment Status

Production-Deployable

Rule Name

DarkSword Repeated WebKit Instability (Time-Bound)

Purpose

Detect repeated exploit-trigger instability using precise timing correlation on the same iOS device.

ATT&CK Technique

T1203 – Exploitation for Client Execution

Telemetry Dependency

Normalized iOS crash logs
Stable device identifier
Normalized application or process naming for WebKit, MobileSafari, or Safari-linked crash context

Tuning Explanation

This is the low-confidence precursor analytic. It is tuned using a bounded interval derived from earliest and latest event timestamps rather than broad time bucketing, which reduces timing smear. It is intentionally lower severity and should be escalated only when same-device behavioral or network corroboration is present.

Detection Logic

Trigger when three or more WebKit- or Safari-linked crash events occur on the same device inside 300 seconds.

Operational Context

Use as the baseline Phase 1 detector where crash telemetry is stable, normalized, and tied to a trustworthy device identifier.

index=mobile_crash process="*WebKit*" OR process="*Safari*"
| stats count earliest(_time) as first latest(_time) as last by device_id
| where count >= 3 AND (last - first) <= 300

Deployment Status

Production-Deployable

Rule Name

DarkSword Instability + Recovery Correlation

Purpose

Detect exploit-trigger progression with higher confidence by correlating repeated WebKit instability with abnormal post-crash recovery behavior on the same device.

ATT&CK Technique

T1203 – Exploitation for Client Execution
Telemetry Dependency

Normalized iOS crash logs
Normalized abnormal recovery or execution-anomaly logs
Stable device identifier
Reasonably aligned timestamps across sources

Tuning Explanation

This is the preferred Splunk Phase 1 production analytic because it materially reduces false positives by requiring both repeated instability and same-device abnormal recovery. It stays Phase 1 pure and avoids reliance on later network or payload behavior. Operationally, it assumes time alignment and device normalization are already solved upstream.

Detection Logic

Trigger when three or more WebKit- or Safari-linked crash events and at least one abnormal recovery or execution anomaly occur on the same device within five minutes.

Operational Context

Use where crash telemetry and abnormal recovery telemetry are both available, normalized, and attributed to the same device. If device identity is weak or timestamps are materially delayed, this rule should be downgraded to hunt support.

(
  search index=mobile_crash (
      app_name="MobileSafari" OR
      app_name="SafariViewService" OR
      process_name="WebKit*" OR
      process_name="Safari*"
  )
  | stats count earliest(_time) as first_crash latest(_time) as last_crash by device_id
  | where count >= 3 AND (last_crash - first_crash) <= 300
)
| join type=inner device_id [
    search index=mobile_behavior event_type="abnormal_recovery"
    | stats earliest(_time) as anomaly_time by device_id
]
| where anomaly_time >= first_crash AND anomaly_time <= last_crash + 300

Deployment Status

Production-Deployable
Environment-Dependent on Same-Device Network Attribution

Rule Name

DarkSword Phase 1 Multi-Signal Convergence

Purpose

Detect high-confidence DarkSword exploit-trigger progression through same-device correlation of repeated WebKit instability, abnormal recovery behavior, and near-term first-seen outbound communication.

ATT&CK Technique

T1203 – Exploitation for Client Execution
T1071 – Application Layer Protocol

Telemetry Dependency

iOS crash telemetry
Abnormal recovery telemetry
DNS or TLS telemetry with first-seen destination enrichment
Reliable same-device attribution across crash, behavior, and network sources
This rule is not production-deployable as written where device-to-network normalization is weak or absent.

Tuning Explanation

This is the highest-confidence Phase 1 analytic in Group 1. It is intentionally conservative and requires three-signal convergence inside a bounded interval. It remains Phase 1 because it detects exploit-trigger progression and immediate corroboration rather than later payload behavior. If same-device network attribution is weak, the rule should be downgraded to hunt-only rather than loosened.

Detection Logic

Trigger when repeated WebKit instability, at least one abnormal recovery event, and at least one first-seen outbound communication event occur on the same device within five minutes of the initial instability sequence.

Operational Context

Use only where crash, device anomaly, and network telemetry are all available and normalized to the same device identity. This is the preferred high-confidence SOC detector for Phase 1 in Splunk-capable environments with mature mobile telemetry correlation.

(
  search index=mobile_crash (
      app_name="MobileSafari" OR
      app_name="SafariViewService" OR
      process_name="WebKit*" OR
      process_name="Safari*"
  )
  | stats count earliest(_time) as first_crash latest(_time) as last_crash by device_id
  | where count >= 3 AND (last_crash - first_crash) <= 300
)
| join type=inner device_id [
    search index=mobile_behavior event_type="abnormal_recovery"
    | stats earliest(_time) as anomaly_time by device_id
]
| join type=inner device_id [
    search index=mobile_network first_seen_dest="true"
    | stats earliest(_time) as network_time values(dest) as dests by device_id
]
| where anomaly_time >= first_crash AND anomaly_time <= last_crash + 300
| where network_time >= first_crash AND network_time <= last_crash + 300

Elastic

Deployment Status

Production-Deployable
Environment-Dependent on normalized mobile crash and abnormal recovery telemetry

Rule Name

DarkSword Repeated WebKit Instability Threshold

Purpose

Detect probable DarkSword exploit-trigger activity by identifying repeated WebKit- or Safari-linked crash behavior on the same iOS device inside a tightly bounded interval.

ATT&CK Technique

T1203 – Exploitation for Client Execution

Telemetry Dependency

Normalized iOS crash telemetry in Elastic
Stable device identifier
Normalized process or application naming for MobileSafari, SafariViewService, or WebKit-linked crash context
This rule is not deployable as intended if mobile crash telemetry is absent, poorly normalized, or not attributable to a stable device identity

Tuning Explanation

This rule is the low-confidence Elastic precursor detector for Phase 1. It is intentionally implemented as a threshold-style production analytic because that is operationally cleaner and more maintainable than forcing repeated-event logic into an overly rigid sequence. It should remain lower severity until corroborated by same-device abnormal recovery.

Detection Logic

Trigger when three or more WebKit- or Safari-linked crash or restart events occur on the same device within five minutes.

Operational Context

Use where iOS crash telemetry is centralized in Elastic and device identity is stable. If crash telemetry is incomplete, delayed, or inconsistently normalized, downgrade to hunt support rather than loosening thresholds.

System-Ready Code

rule_name: DarkSword Repeated WebKit Instability Threshold
rule_type: threshold
index:
  - mobile-crash-*
query: >
  event.dataset:"mobile.crash" AND
  (
    process.name:/WebKit.*/ OR
    process.name:/Safari.*/ OR
    app.name:("MobileSafari" OR "SafariViewService")
  )
threshold:
  field: device.id
  value: 3
time_window: 5m
severity: low
risk_score: 35

Deployment Status

Production-Deployable
Environment-Dependent on same-device abnormal recovery visibility

Rule Name

DarkSword Repeated Instability with Abnormal Recovery Correlation

Purpose

Detect likely DarkSword exploit-trigger progression by correlating repeated WebKit instability with abnormal recovery on the same iOS device.

ATT&CK Technique

T1203 – Exploitation for Client Execution

Telemetry Dependency

Normalized iOS crash telemetry
Normalized abnormal recovery telemetry from mobile sources using the canonical value abnormal_recovery

Stable same-device identity across both event classes
This rule is not deployable as intended where abnormal recovery telemetry is absent, not normalized, or cannot be mapped to the same device

Tuning Explanation

This is the preferred Elastic Phase 1 production analytic because it materially reduces false positives by requiring repeated instability plus abnormal same-device follow-on behavior. It stays phase-pure and does not depend on payload or communication events.

Detection Logic

Trigger when a repeated WebKit instability sequence is followed by abnormal recovery on the same device within five minutes.

Operational Context

Use only where crash telemetry and abnormal recovery telemetry are both available and same-device correlation is reliable. If abnormal recovery visibility is partial, retain medium severity and use analyst confirmation rather than broadening the rule.

System-Ready Code

sequence by device.id with maxspan=5m
  [any where event.dataset == "mobile.crash"
        and (
          process.name like "WebKit*" or
          process.name like "Safari*" or
          app.name in ("MobileSafari","SafariViewService")
        )]
  [any where event.dataset == "mobile.crash"
        and (
          process.name like "WebKit*" or
          process.name like "Safari*" or
          app.name in ("MobileSafari","SafariViewService")
        )]
  [any where event.dataset == "mobile.crash"
        and (
          process.name like "WebKit*" or
          process.name like "Safari*" or
          app.name in ("MobileSafari","SafariViewService")
        )]
  [any where event.dataset == "mobile.behavior"
        and event.action == "abnormal_recovery"]

QRadar

Deployment Status

Conditionally Deployable
Production-usable only where mobile crash telemetry and same-device CRE correlation are available

Rule Name

DarkSword Repeated WebKit Instability Building Block

Purpose

Create a QRadar building block for repeated WebKit- or Safari-linked instability on the same iOS device to support higher-confidence Phase 1 CRE correlation.

ATT&CK Technique

T1203 – Exploitation for Client Execution

Telemetry Dependency

Normalized mobile crash events in QRadar
Stable device identifier or equivalent asset identity
Normalized app or process naming for MobileSafari, SafariViewService, or WebKit-linked contexts
This rule is not deployable as intended where mobile crash telemetry is not ingested into QRadar

Tuning Explanation

This content is intentionally implemented as a building block rather than a final offense rule so it can drive same-device Phase 1 correlation. It is hardened by requiring repeated instability in a short interval and should not be used by itself as a final high-severity signal.

Detection Logic

Create a building block when three or more WebKit- or Safari-linked crash or restart events occur on the same device within five minutes.

Operational Context

Use as the foundational QRadar Phase 1 signal for later CRE correlation with abnormal recovery. Keep this at low or medium confidence until a second same-device signal is present.

System-Ready Code

Building Block Name:
BB: DarkSword Repeated WebKit Instability

BB Test:
when the event(s) were detected by one or more of the following log source type(s):
  Mobile Telemetry
and when the normalized event name is:
  Crash
or
  Restart
and when at least one of the following is true:
  processname ILIKE 'WebKit%'
  processname ILIKE 'Safari%'
  appname = 'MobileSafari'
  appname = 'SafariViewService'
and when at least 3 events are seen with the same deviceid in 5 minutes

Deployment Status

Conditionally Deployable
Production-usable only where abnormal recovery telemetry exists

Rule Name

DarkSword Instability-to-Abnormal-Recovery CRE Correlation

Purpose

Detect likely DarkSword exploit-trigger progression by correlating repeated WebKit instability with abnormal recovery on the same iOS device.

ATT&CK Technique

T1203 – Exploitation for Client Execution

Telemetry Dependency

QRadar building block for repeated instability
Normalized abnormal recovery telemetry using the canonical value abnormal_recovery
Reliable same-device identity across both signal classes
This rule is not deployable as intended where abnormal recovery events are not ingested or cannot be tied to the same device identity

Tuning Explanation

This rule stays Phase 1 pure and is stronger than crash-only logic because it requires a second same-device signal. It uses ordered CRE logic: instability first, abnormal recovery second, on the same device, inside five minutes.

Detection Logic

Raise a medium-severity offense when the repeated-instability building block is followed by abnormal recovery on the same device within five minutes.

Operational Context

Use as the higher-confidence QRadar Phase 1 analytic only where both crash and abnormal recovery events are available. If only crash telemetry exists, retain the building block and do not force offense creation.

System-Ready Code

CRE Rule Name:
DarkSword Instability-to-Abnormal-Recovery CRE Correlation

Rule Logic:
when BB: DarkSword Repeated WebKit Instability has matched
and then when an event is seen with:
  eventaction = 'abnormal_recovery'
on the same deviceid
within 5 minutes after the building block match

Response:
create offense
severity: medium
magnitude: medium

YARA

Deployment Status

Conditionally Deployable
Forensic or diagnostic artifact triage only

Rule Name

DarkSword iOS WebKit Diagnostic Bundle Triage

Purpose

Support forensic triage of exported iOS diagnostic or crash bundles by identifying WebKit- and Safari-linked diagnostic structures consistent with repeated Phase 1 instability on suspected DarkSword devices.

ATT&CK Technique

T1203 – Exploitation for Client Execution

Telemetry Dependency

Collected iOS crash logs, sysdiagnose bundles, mobile diagnostic exports, or forensic artifact packages
File-access workflow capable of scanning collected diagnostic artifacts with YARA
This rule is not deployable as a real-time detector and must not be presented as an inline exploit-prevention rule

Tuning Explanation

YARA is not a primary real-time detection platform for DarkSword Phase 1. This rule is acceptable only as forensic support content for already collected diagnostics. It is intentionally scoped to iOS WebKit and Safari diagnostic structures rather than generic crash text, which keeps it threat-relevant without overstating live-detection capability.

Detection Logic

Match diagnostic or crash artifacts containing WebKit- or Safari-linked indicators plus iOS crash-reporting metadata commonly present in sysdiagnose or exported diagnostic bundles.

Operational Context

Use during incident response, forensic review, or MDM-driven diagnostic collection when a device is already suspected. Do not use as a live detection substitute.

System-Ready Code

rule CYBERDAX_DarkSword_iOS_WebKit_Diagnostic_Bundle
{
    meta:
        description = "Identifies iOS WebKit/Safari diagnostic artifacts consistent with repeated Phase 1 instability"
        author = "CyberDax Detection Engineering"
        version = "1.2"
    strings:
        $a = "WebKit" ascii nocase
        $b = "MobileSafari" ascii nocase
        $c = "SafariViewService" ascii nocase
        $d = "CrashReporter Key" ascii nocase
        $e = "Exception Type" ascii nocase
        $f = "Termination Reason" ascii nocase
        $g = "Incident Identifier" ascii nocase
        $h = "Process:" ascii nocase
    condition:
        5 of ($a,$b,$c,$d,$e,$f,$g,$h)
}

Sigma

Deployment Status

Conditionally Deployable
Portable content only where mobile crash telemetry is normalized to Sigma-compatible fields and the backend supports correlation or threshold logic

Rule Name

DarkSword Repeated WebKit Instability on iOS

Purpose

Provide portable detection logic intended for backend-native conversion for repeated WebKit- or Safari-linked instability on the same iOS device.

ATT&CK Technique

T1203 – Exploitation for Client Execution

Telemetry Dependency

Normalized mobile crash events mapped into Sigma-compatible fields
Stable device identifier
App or process fields for WebKit- or Safari-linked contexts
Backend support for same-device repeated-event thresholds
This rule is not deployable as intended if the target backend cannot express same-device repetition inside a bounded interval

 

Tuning Explanation

This rule is the portable precursor detector for Phase 1. It is intentionally limited to repeated instability and should be converted only where iOS crash telemetry exists in a compatible schema and the backend can enforce “same device, three or more events, five-minute window” logic.

Detection Logic

Detect repeated WebKit- or Safari-linked crash or restart events on the same device within five minutes.

Operational Context

Use as portable content feeding backend-native detection engineering. Do not treat it as a single-event detector or final high-confidence rule without backend-supported aggregation.

System-Ready Code

title: DarkSword Repeated WebKit Instability on iOS
id: 9dd2d8ef-5f36-4e64-a2c1-darksword-ios-webkit-instability
status: experimental
logsource:
  category: mobile_crash
detection:
  selection_app:
    AppName|contains:
      - 'MobileSafari'
      - 'SafariViewService'
      - 'WebKit'
  selection_action:
    EventAction:
      - 'Crash'
      - 'Restart'
  condition: selection_app and selection_action
  timeframe: 5m
level: medium
tags:
  - attack.t1203
fields:
  - DeviceId
  - AppName
  - EventAction
correlation:
  type: event_count
  group-by:
    - DeviceId
  timespan: 5m
  condition:
    gte: 3
falsepositives:
  - Repeated crash loops during QA or device validation

Deployment Status

Conditionally Deployable
Portable content only where crash and abnormal recovery telemetry are both normalized with same-device correlation support

Rule Name

DarkSword WebKit Instability with Abnormal Recovery Correlation

Purpose

Provide portable Phase 1 content for higher-confidence DarkSword exploit-trigger progression by correlating repeated instability with abnormal recovery on the same device.

ATT&CK Technique

T1203 – Exploitation for Client Execution

Telemetry Dependency

Normalized mobile crash events
Normalized abnormal recovery telemetry using the canonical value abnormal_recovery
Stable device identity in Sigma-compatible fields
Backend support for same-device bounded correlation
This rule is not deployable as intended where post-crash anomaly telemetry is unavailable or cannot be correlated to the same device

Tuning Explanation

This rule is the portable equivalent of the higher-confidence crash-plus-recovery analytics used in backend-native platforms. It remains Phase 1 pure and should be converted only where both event classes are present and same-device identity is preserved.

Detection Logic

Detect repeated WebKit instability plus abnormal recovery on the same device inside five minutes.

Operational Context

Use as portable content for backend-native correlation logic where both crash and abnormal recovery telemetry exist. Do not collapse it into crash-only logic.

System-Ready Code

title: DarkSword WebKit Instability with Abnormal Recovery Correlation
id: c304a7a2-8d38-4f43-9d2b-darksword-ios-recovery-correlation

status: experimental
logsource:
  category: mobile
detection:
  selection_crash:
    AppName|contains:
      - 'MobileSafari'
      - 'SafariViewService'
      - 'WebKit'
    EventAction:
      - 'Crash'
      - 'Restart'
  selection_recovery:
    EventAction: 'abnormal_recovery'
  condition: selection_crash and selection_recovery
  timeframe: 5m
level: high
tags:
  - attack.t1203
fields:
  - DeviceId
  - AppName
  - EventAction
correlation:
  type: temporal
  group-by:
    - DeviceId
  timespan: 5m
falsepositives:
  - QA-driven repeated crash testing with abnormal recovery instrumentation

AWS

Deployment Status

Production-Deployable in environments where normalized mobile crash and abnormal recovery telemetry are centralized in AWS analytics and same-device identity is preserved across sources

Rule Name

DarkSword Repeated WebKit Instability Threshold

Purpose

Detect probable DarkSword exploit-trigger activity by identifying repeated WebKit- or Safari-linked crash behavior on the same iOS device inside a tightly bounded interval using AWS-native analytics.

ATT&CK Technique

T1203 – Exploitation for Client Execution

Telemetry Dependency

A normalized crash telemetry dataset containing:

·        device_id

·        event_time

·        app_name

·        process_name

The implementation example below uses mobile_crash_logs as a placeholder normalized source name. This rule is not deployable as intended if crash telemetry is absent, poorly normalized, or not attributable to a stable device_id.

Tuning Explanation

This is the low-confidence AWS precursor detector for Phase 1. It is tuned as a bounded same-device threshold analytic and should remain lower severity until corroborated by same-device abnormal recovery. It must not be widened into generic mobile crash detection. The SQL assumes upstream normalization into the required canonical fields.

Detection Logic

Trigger when three or more WebKit- or Safari-linked crash or restart events occur on the same device within five minutes.

Operational Context

Use where mobile crash telemetry is reliably centralized into AWS analytics and same-device attribution is preserved. If device_id integrity or timestamp normalization is weak, downgrade to hunt support rather than loosening thresholds.

System-Ready Code

WITH crash_windows AS (
  SELECT
    device_id,
    COUNT(*) AS crash_count,
    MIN(event_time) AS first_crash,
    MAX(event_time) AS last_crash
  FROM mobile_crash_logs
  WHERE
    app_name IN ('MobileSafari','SafariViewService')
    OR process_name LIKE 'WebKit%'
    OR process_name LIKE 'Safari%'
  GROUP BY device_id
  HAVING COUNT(*) >= 3
     AND date_diff('second', MIN(event_time), MAX(event_time)) <= 300
)
SELECT
  device_id,
  crash_count,
  first_crash,
  last_crash
FROM crash_windows;

Deployment Status

Production-Deployable in environments where normalized abnormal recovery telemetry is centralized in AWS analytics and same-device identity is preserved across crash and behavior sources

Rule Name

DarkSword Repeated Instability with Abnormal Recovery Correlation

Purpose

Detect likely DarkSword exploit-trigger progression by correlating repeated WebKit instability with abnormal recovery on the same iOS device in AWS-native analytics.

ATT&CK Technique

T1203 – Exploitation for Client Execution

Telemetry Dependency

A normalized crash telemetry dataset containing:

·        device_id

·        event_time

·        app_name

·        process_name

A normalized behavior telemetry dataset containing:

·        device_id

·        event_time

·        event_action

event_action must use the canonical normalized value abnormal_recovery. The implementation example below uses mobile_crash_logs and mobile_behavior_logs as placeholder normalized source names. This rule is not deployable as intended where abnormal recovery telemetry is absent, not normalized, or cannot be mapped to the same device_id.

Tuning Explanation

This is the preferred AWS Phase 1 production analytic because it materially reduces false positives by requiring repeated instability plus abnormal same-device follow-on behavior. It stays phase-pure and does not depend on payload or later communication behavior. Sequence order is explicit: abnormal recovery must occur after the instability window begins and within five minutes of the repeated-instability window closing.

Detection Logic

Trigger when a repeated WebKit instability window is established and an abnormal recovery event occurs on the same device after the first crash and within five minutes of the last crash.

Operational Context

Use only where crash telemetry and abnormal recovery telemetry are centralized and same-device correlation is reliable. If event_action is not normalized to abnormal_recovery, normalize upstream before deployment.

System-Ready Code

WITH crash_windows AS (
  SELECT
    device_id,
    COUNT(*) AS crash_count,
    MIN(event_time) AS first_crash,
    MAX(event_time) AS last_crash
  FROM mobile_crash_logs
  WHERE
    app_name IN ('MobileSafari','SafariViewService')
    OR process_name LIKE 'WebKit%'
    OR process_name LIKE 'Safari%'
  GROUP BY device_id
  HAVING COUNT(*) >= 3
     AND date_diff('second', MIN(event_time), MAX(event_time)) <= 300
),
recovery_events AS (
  SELECT
    device_id,
    event_time AS recovery_time
  FROM mobile_behavior_logs
  WHERE event_action = 'abnormal_recovery'
)
SELECT
  c.device_id,
  c.crash_count,
  c.first_crash,
  c.last_crash,
  MIN(r.recovery_time) AS recovery_time
FROM crash_windows c
JOIN recovery_events r
  ON c.device_id = r.device_id
WHERE r.recovery_time > c.first_crash
  AND r.recovery_time <= date_add('second', 300, c.last_crash)
GROUP BY c.device_id, c.crash_count, c.first_crash, c.last_crash;

Azure

Deployment Status

Production-Deployable in environments where normalized mobile crash and abnormal recovery telemetry are available in Sentinel or Log Analytics and same-device identity is preserved across sources

Rule Name

DarkSword Repeated WebKit Instability Threshold

Purpose

Detect probable DarkSword exploit-trigger activity by identifying repeated WebKit- or Safari-linked crash behavior on the same iOS device inside a tightly bounded interval using Azure-native analytics.

ATT&CK Technique

T1203 – Exploitation for Client Execution

Telemetry Dependency

A normalized crash telemetry table containing:

·        DeviceId

·        TimeGenerated

·        AppName

·        ProcessName

The implementation example below uses MobileCrashLogs as a placeholder normalized source name. This rule is not deployable as intended where mobile crash telemetry is not ingested into Azure analytics or cannot be tied to a stable DeviceId.

Tuning Explanation

This is the low-confidence Azure precursor detector for Phase 1. It is tuned as a bounded same-device threshold analytic and should remain lower severity until corroborated by same-device abnormal recovery. It must not be widened into generic mobile instability detection.

Detection Logic

Trigger when three or more WebKit- or Safari-linked crash or restart events occur on the same device within five minutes.

Operational Context

Use where mobile crash telemetry is present in Sentinel or Log Analytics and device identity is stable. If local schema differs, map fields to the canonical model before deployment.

System-Ready Code

MobileCrashLogs
| where AppName in ("MobileSafari","SafariViewService")
    or ProcessName startswith "WebKit"
    or ProcessName startswith "Safari"
| summarize CrashCount=count(), FirstCrash=min(TimeGenerated), LastCrash=max(TimeGenerated) by DeviceId
| where CrashCount >= 3 and datetime_diff('second', LastCrash, FirstCrash) <= 300

Deployment Status

Production-Deployable in environments where normalized abnormal recovery telemetry is available in Azure analytics and same-device identity is preserved across crash and behavior sources

Rule Name

DarkSword Repeated Instability with Abnormal Recovery Correlation

Purpose

Detect likely DarkSword exploit-trigger progression by correlating repeated WebKit instability with abnormal recovery on the same iOS device using Azure-native analytics.

ATT&CK Technique

T1203 – Exploitation for Client Execution

Telemetry Dependency

A normalized crash telemetry table containing:

·        DeviceId

·        TimeGenerated

·        AppName

·        ProcessName

A normalized behavior telemetry table containing:

·        DeviceId

·        TimeGenerated

·        EventAction

EventAction must use the canonical normalized value abnormal_recovery. The implementation example below uses MobileCrashLogs and MobileBehaviorLogs as placeholder normalized source names. This rule is not deployable as intended where abnormal recovery telemetry is absent, not normalized, or cannot be correlated to the same DeviceId.

Tuning Explanation

This is the preferred Azure Phase 1 production analytic because it materially reduces false positives by requiring repeated instability plus abnormal same-device follow-on behavior. It stays phase-pure and does not depend on later payload behavior. Sequence order is explicit: abnormal recovery must occur after the instability window begins and within five minutes of the last crash.

Detection Logic

Trigger when a repeated WebKit instability window is established and an abnormal recovery event occurs on the same device after the first crash and within five minutes of the last crash.

Operational Context

Use only where crash telemetry and abnormal recovery telemetry both exist in Azure analytics and same-device identity is reliable. If source telemetry uses different anomaly labels, normalize to abnormal_recovery before deployment.

System-Ready Code

let CrashWindows =
    MobileCrashLogs
    | where AppName in ("MobileSafari","SafariViewService")
        or ProcessName startswith "WebKit"
        or ProcessName startswith "Safari"
    | summarize CrashCount=count(), FirstCrash=min(TimeGenerated), LastCrash=max(TimeGenerated) by DeviceId
    | where CrashCount >= 3 and datetime_diff('second', LastCrash, FirstCrash) <= 300;
let RecoveryEvents =
    MobileBehaviorLogs
    | where EventAction == "abnormal_recovery"
    | project DeviceId, RecoveryTime=TimeGenerated;
CrashWindows
| join kind=inner RecoveryEvents on DeviceId
| where RecoveryTime > FirstCrash
| where RecoveryTime <= LastCrash + 5m

GCP

Deployment Status

Production-Deployable in environments where normalized mobile crash and abnormal recovery telemetry are centralized in BigQuery, Chronicle, or equivalent GCP analytics and same-device identity is preserved across sources

Rule Name

DarkSword Repeated WebKit Instability Threshold

Purpose

Detect probable DarkSword exploit-trigger activity by identifying repeated WebKit- or Safari-linked crash behavior on the same iOS device inside a tightly bounded interval using GCP-native analytics.

ATT&CK Technique

T1203 – Exploitation for Client Execution

Telemetry Dependency

A normalized crash telemetry dataset containing:

·        device_id

·        event_time

·        app_name

·        process_name

The implementation example below uses project.dataset.mobile_crash_logs as a placeholder normalized source name. This rule is not deployable as intended where mobile crash telemetry is absent or not attributable to a stable device_id.

Tuning Explanation

This is the low-confidence GCP precursor detector for Phase 1. It is tuned as a bounded same-device threshold analytic and should remain lower severity until corroborated by abnormal recovery. It must not be generalized into broad mobile instability detection.

Detection Logic

Trigger when three or more WebKit- or Safari-linked crash or restart events occur on the same device within five minutes.

Operational Context

Use where mobile crash telemetry is centralized into GCP and same-device identity is preserved. If local schema differs, map fields to the canonical model before deployment.

System-Ready Code

WITH crash_windows AS (
  SELECT
    device_id,
    COUNT(*) AS crash_count,
    MIN(event_time) AS first_crash,
    MAX(event_time) AS last_crash
  FROM `project.dataset.mobile_crash_logs`
  WHERE
    app_name IN ('MobileSafari','SafariViewService')
    OR process_name LIKE 'WebKit%'
    OR process_name LIKE 'Safari%'
  GROUP BY device_id
  HAVING crash_count >= 3
     AND TIMESTAMP_DIFF(MAX(event_time), MIN(event_time), SECOND) <= 300
)
SELECT
  device_id,
  crash_count,
  first_crash,
  last_crash
FROM crash_windows;

Deployment Status

Production-Deployable in environments where normalized abnormal recovery telemetry is centralized in GCP analytics and same-device identity is preserved across crash and behavior sources

Rule Name

DarkSword Repeated Instability with Abnormal Recovery Correlation

Purpose

Detect likely DarkSword exploit-trigger progression by correlating repeated WebKit instability with abnormal recovery on the same iOS device using GCP-native analytics.

ATT&CK Technique

T1203 – Exploitation for Client Execution

Telemetry Dependency

A normalized crash telemetry dataset containing:

·        device_id

·        event_time

·        app_name

·        process_name

A normalized behavior telemetry dataset containing:

·        device_id

·        event_time

·        event_action

event_action must use the canonical normalized value abnormal_recovery. The implementation example below uses project.dataset.mobile_crash_logs and project.dataset.mobile_behavior_logs as placeholder normalized source names. This rule is not deployable as intended where abnormal recovery telemetry is absent, not normalized, or cannot be correlated to the same device_id.

Tuning Explanation

This is the preferred GCP Phase 1 production analytic because it materially reduces false positives by requiring repeated instability plus abnormal same-device follow-on behavior. It stays phase-pure and does not depend on later payload or communication behavior. Sequence order is explicit: abnormal recovery must occur after the instability window begins and within five minutes of the last crash.

Detection Logic

Trigger when a repeated WebKit instability window is established and an abnormal recovery event occurs on the same device after the first crash and within five minutes of the last crash.

Operational Context

Use only where crash telemetry and abnormal recovery telemetry are both available in GCP analytics and same-device correlation is reliable. If source anomaly labels differ, normalize them to abnormal_recovery before deployment.

System-Ready Code

WITH crash_windows AS (
  SELECT
    device_id,
    COUNT(*) AS crash_count,
    MIN(event_time) AS first_crash,
    MAX(event_time) AS last_crash
  FROM `project.dataset.mobile_crash_logs`
  WHERE
    app_name IN ('MobileSafari','SafariViewService')
    OR process_name LIKE 'WebKit%'
    OR process_name LIKE 'Safari%'
  GROUP BY device_id
  HAVING crash_count >= 3
     AND TIMESTAMP_DIFF(MAX(event_time), MIN(event_time), SECOND) <= 300
),
recovery_events AS (
  SELECT
    device_id,
    event_time AS recovery_time
  FROM `project.dataset.mobile_behavior_logs`
  WHERE event_action = 'abnormal_recovery'
)
SELECT
  c.device_id,
  c.crash_count,
  c.first_crash,
  c.last_crash,
  MIN(r.recovery_time) AS recovery_time
FROM crash_windows c
JOIN recovery_events r
  ON c.device_id = r.device_id
WHERE r.recovery_time > c.first_crash
  AND r.recovery_time <= TIMESTAMP_ADD(c.last_crash, INTERVAL 5 MINUTE)
GROUP BY c.device_id, c.crash_count, c.first_crash, c.last_crash;

S26 Threat-to-Rule Traceability Matrix

Behavior 1

WebKit-driven client exploitation causing repeated crash or restart instability on the same device

ATT&CK Technique

T1203 – Exploitation for Client Execution
Exploitation of a client application (WebKit/Safari) resulting in repeated crash or restart behavior during exploit triggering.

Mapped Rules

·        DarkSword Repeated WebKit Crash Threshold

·        DarkSword Repeated WebKit Instability (Time-Bound)

·        DarkSword Repeated WebKit Instability Threshold

·        DarkSword Repeated WebKit Instability Building Block

·        DarkSword Repeated WebKit Instability on iOS

·        DarkSword Repeated WebKit Instability Threshold (AWS, Azure, GCP)

Primary Detection Signa

Repeated WebKit or Safari-linked crash or restart events exceeding normal device behavior within a bounded time window

Telemetry Dependency

·        Normalized iOS crash telemetry

·        Stable same-device identifier

·        Normalized WebKit or Safari-linked application or process naming

Coverage Disposition

Detected

Disposition Rationale

This is the foundational exploit-trigger signal and is directly represented across endpoint, SIEM, portable, and cloud-native rules. It is consistently detectable where crash telemetry is available and normalized.

Behavior 2

Exploit-trigger progression resulting in repeated instability followed by abnormal same-device recovery behavior

ATT&CK Technique

T1203 – Exploitation for Client Execution
Exploitation results in execution instability followed by abnormal recovery or execution-context anomaly behavior.

Mapped Rules

·        DarkSword Crash-to-Abnormal-Recovery Correlation

·        DarkSword Instability + Recovery Correlation

·        DarkSword Repeated Instability with Abnormal Recovery Correlation

·        DarkSword Instability-to-Abnormal-Recovery CRE Correlation

·        DarkSword WebKit Instability with Abnormal Recovery Correlation

·        DarkSword Repeated Instability with Abnormal Recovery Correlation (AWS, Azure, GCP)

Primary Detection Signal

Correlation of repeated WebKit instability events with a subsequent abnormal recovery event on the same device

Telemetry Dependency

·        Normalized iOS crash telemetry

·        Normalized anomaly telemetry mapped to abnormal_recovery

·        Stable same-device identity across crash and behavior sources

·        Time alignment between crash and recovery events

Coverage Disposition

Detected

Disposition Rationale

This is the highest-confidence Phase 1 exploit indicator and is directly implemented across all rule groups. Detection strength is high where abnormal recovery telemetry is available and normalized.

Behavior 3

Exploit-trigger window producing instability followed by immediate same-device outbound communication onset

ATT&CK Technique

T1203 – Exploitation for Client Execution
T1071 – Application Layer Protocol
Exploitation is followed by immediate application-layer communication consistent with exploit-trigger or staging behavior.

Mapped Rules

·        DarkSword iOS Repeated Non-Approved DNS Burst Corroborator

·        DarkSword iOS Early TLS Session Burst Corroborator

·        DarkSword Phase 1 Multi-Signal Convergence

Primary Detection Signal

Correlation of repeated instability with first-seen or non-approved outbound DNS or TLS communication within a bounded post-instability window

Telemetry Dependency

·        DNS telemetry

·        TLS telemetry

·        First-seen destination enrichment

·        Reliable same-device attribution between endpoint and network sources

·        Maintained allowlists for approved mobile infrastructure

·        IOS_NETS and APPROVED_MOBILE_DESTS variable integrity

Coverage Disposition

Partially Detected

Disposition Rationale

This behavior is strongly detectable in platforms with endpoint-to-network correlation (for example Splunk). In network-only systems, detection is explicitly corroborative. Because coverage is not uniform across platforms, Partially Detected is the correct classification.

Behavior 4

Network-only corroboration of a suspected exploit-trigger window from iOS-attributed traffic

ATT&CK Technique

T1203 – Exploitation for Client Execution
Network activity reflects exploit-trigger side effects but lacks direct endpoint confirmation.

Mapped Rules

·        DarkSword iOS Repeated Non-Approved DNS Burst Corroborator

·        DarkSword iOS Early TLS Session Burst Corroborator

Primary Detection Signal

Burst or deviation in outbound DNS or TLS communication to non-approved or first-seen destinations from iOS-attributed traffic

Telemetry Dependency

·        DNS or TLS metadata

·        Reliable iOS traffic attribution

·        Maintained allowlists for Apple, MDM, proxy, and sanctioned infrastructure

·        IOS_NETS and APPROVED_MOBILE_DESTS variable maintenance

Coverage Disposition

Partially Detected

Disposition Rationale

These rules are explicitly defined as corroborating-only detections and do not independently confirm exploitation. They support detection confidence when combined with endpoint signals.

Behavior 5

Portable detection of repeated instability and instability-to-recovery correlation in backend-converted environments

ATT&CK Technique

T1203 – Exploitation for Client Execution

Mapped Rules

·        DarkSword Repeated WebKit Instability on iOS

·        DarkSword WebKit Instability with Abnormal Recovery Correlation

Primary Detection Signal

Backend-converted detection of repeated instability and instability-to-recovery correlation using Sigma-derived logic

Telemetry Dependency

·        Normalized mobile crash telemetry in Sigma-compatible schema

·        Normalized anomaly telemetry mapped to abnormal_recovery

·        Backend support for aggregation or temporal correlation

·        Stable same-device identity in the target platform

Coverage Disposition

Partially Detected

Disposition Rationale

Detection capability depends on backend implementation and correlation support. Because the rule requires conversion and backend capability, coverage is conditional.

Behavior 6

Forensic confirmation of exploit-trigger instability through diagnostic artifact analysis

ATT&CK Technique

T1203 – Exploitation for Client Execution
Evidence of exploitation is derived from diagnostic artifacts rather than real-time telemetry.

Mapped Rules

·        DarkSword iOS WebKit Diagnostic Bundle Triage

Primary Detection Signal

Presence of WebKit or Safari-linked crash artifacts and diagnostic metadata in collected iOS forensic bundles

Telemetry Dependency

·        Sysdiagnose bundles or crash exports

·        Forensic collection workflow

·        YARA scanning capability

Coverage Disposition

Hunt Only

Disposition Rationale

This rule supports investigation and confirmation rather than real-time detection. It is correctly classified as Hunt Only.

Behavior 7

Cloud-native correlation of instability and abnormal recovery in centralized analytics environments

ATT&CK Technique

T1203 – Exploitation for Client Execution
Exploitation behavior is detected through centralized aggregation and correlation of device telemetry.

Mapped Rules

·        DarkSword Repeated Instability with Abnormal Recovery Correlation (AWS, Azure, GCP)

Primary Detection Signal

Correlation of repeated instability and abnormal recovery within centralized cloud analytics pipelines

Telemetry Dependency

·        Centralized crash telemetry

Centralized anomaly telemetry normalized to abnormal_recovery

·        Stable same-device identity across ingestion pipelines

·        Consistent timestamp normalization

Coverage Disposition

Detected

Disposition Rationale

Cloud platforms provide consistent and scalable correlation of the core exploit behavior when telemetry is properly centralized and normalized.

Coverage Integrity Note

This matrix applies strict rule-accountability discipline. Behaviors are marked Detected only where direct, deployable, behavior-aligned detection exists under stated telemetry conditions.

Behaviors dependent on:

·        corroboration-only signals

·        backend conversion requirements

·        forensic workflows

·        or incomplete same-device identity

are conservatively classified as Partially Detected or Hunt Only.

Detection limitations caused by missing telemetry (for example absence of abnormal recovery data or loss of same-device identity) are treated as environmental constraints, not separate attacker behaviors, and are reflected within the relevant behavior dispositions rather than modeled as standalone behaviors.

Previous
Previous

[CVE] CVE-2026-3055 Citrix NetScaler ADC Memory Disclosure Unauthenticated Edge Exploitation

Next
Next

[EXP] DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform