Skip to content

Hide Navigation Hide TOC

Coruna (8420e351-be40-40c4-8d6a-84155830cb34)

The Coruna exploit kit provides another example of how sophisticated capabilities proliferate. Over the course of 2025, GTIG tracked its use in highly targeted operations initially conducted by a customer of a surveillance vendor, then observed its deployment in watering hole attacks targeting Ukrainian users by UNC6353, a suspected Russian espionage group. We then retrieved the complete exploit kit when it was later used in broad-scale campaigns by UNC6691, a financially motivated threat actor operating from China. How this proliferation occurred is unclear, but suggests an active market for "second hand" zero-day exploits. Beyond these identified exploits, multiple threat actors have now acquired advanced exploitation techniques that can be re-used and modified with newly identified vulnerabilities.

Cluster A Galaxy A Cluster B Galaxy B Level
Coruna (8420e351-be40-40c4-8d6a-84155830cb34) Exploit-Kit UNC6691 (989a795c-efed-4528-90c8-9807a49f84ce) Threat Actor 1