The malicious copy of Xcode allowed a number of infected apps to pass through Apple's code review process, and could be installed into iOS devices, including unmodified (non-jailbroken) ones.Īccording to researchers from Palo Alto Networks, apps infected with the malware-since labeled as XcodeGhost and detected as IOS_XcodeGhost.A-collected information from devices that installed them before encrypting and uploading the data to the attackers' command and control servers. Evidently, the apps were infected after being compiled using a spiked version of Xcode-Apple's official tool for developing iOS and Mac apps-which was uploaded to Chinese cloud file sharing site Baidu. Recently, there have been reports of Chinese apps hosted on the official App Store that were found to be infected with malware designed to steal information from iOS devices. ![]() While the iOS ecosystem is comparatively considered "safer" in the sense that there are simply far more threats designed to target other mobile operating systems, it's not perfect, and some still manage to fall through the cracks. Simply put, when malware manages to get through Apple's App Store policies and curation process, it's a big deal. Malware that targets-and successfully infects-unmodified iOS devices are comparatively few and far between, with the few that does manage to create a stir usually affecting jailbroken phones.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |