Pages: [1]   Go Down
  Print  
Author Topic: What You Need to Know About iOS Malware XcodeGhost  (Read 441 times)
HCK
Global Moderator
Hero Member
*****
Posts: 79425



« on: September 22, 2015, 09:00:09 pm »

What You Need to Know About iOS Malware XcodeGhost

<img src="" alt="xcode-6" width="256" height="256" class="alignright size-full wp-image-465787" />Earlier this week, Chinese developers disclosed new iOS malware called XcodeGhost on microblogging service Sina Weibo. U.S. cybersecurity firm Palo Alto Networks has since published details about the malware.
 
 MacRumors has created a FAQ so you can learn more about XcodeGhost and how to keep your iOS devices protected.
 
 <strong>What is XcodeGhost?</strong>
 XcodeGhost is a new iOS malware arising from a malicious version of Xcode, Apple's official tool for developing iOS and OS X apps.
 
 <strong>How is XcodeGhost distributed?</strong>
 A malicious version of Xcode was uploaded to Chinese cloud file sharing service Baidu and downloaded by some iOS developers in China.
 
 Chinese developers then unknowingly compiled iOS apps using the modified Xcode IDE and distributed those infected apps through the App Store.
 
 Those apps then managed to pass through Apple's code review process, enabling iOS users to install or update the infected apps on their devices.
 
 <strong>Which devices are affected?</strong>
 iPhone, iPad and iPod touch models running an iOS version compatible with any of the infected apps. The malware affects both stock and jailbroken devices.
 
 <strong>Which apps are affected?</strong>
 Palo Alto Networks has shared a full list of over 50 infected iOS apps, including WeChat, NetEase Cloud Music, WinZip, Didi Chuxing, Railway 12306, China Unicom Mobile Office and Tonghuashun.
 
 <strong>How many users are affected?</strong>
 XcodeGhost potentially affects more than 500 million iOS users, primarily because messaging app WeChat is very popular in China and the Asia-Pacific region.
 
 <strong>Which unofficial versions of Xcode are affected?</strong>
 All unofficial versions between Xcode 6.1 and Xcode 6.4.
 
 <strong>How does XcodeGhost put my iOS devices at risk?</strong>
 iOS apps infected with XcodeGhost malware can and do collect information about devices and then encrypt and upload that data to command and control (C2) servers run by attackers through the HTTP protocol. The system and app information that can be collected includes:
 
 <li>Current time
 <li>Current infected app’s name
 <li>The app’s bundle identifier
 <li>Current device’s name and type
 <li>Current system’s language and country
 <li>Current device’s UUID
 <li>Network type
 
 Palo Alto Networks also discovered that infected iOS apps can receive commands from the attacker through the C2 server to perform the following actions:
 
 <li>Prompt a fake alert dialog to phish user credentials;
 <li>Hijack opening specific URLs based on their scheme, which could allow for exploitation of vulnerabilities in the iOS system or other iOS apps;
 <li>Read and write data in the user’s clipboard, which could be used to read the user’s password if that password is copied from a password management tool.
 
 <strong>Can XcodeGhost affect users outside of China?</strong>
 Yes. Some of the iOS apps infected with XcodeGhost malware are available on the App Store in countries outside of China. CamCard, for example, is a popular business card reader and scanner app available in the United States and several other countries, while WeChat is a popular messaging app in the Asia-Pacific region.
 
 <strong>Why would some Chinese developers download Xcode from Baidu?</strong>
 Xcode is a large file that can take a long time to download from Apple's servers in China, leading some developers to download Xcode from unofficial sources.
 
 <strong>How are Apple and Chinese developers dealing with XcodeGhost?</strong>
 Palo Alto Networks claims that it is cooperating with Apple on the issue, while multiple developers have updated their apps to remove the malware.
 
 Apple has since issued the following statement to Reuters:
"We’ve removed the apps from the App Store that we know have been created with this counterfeit software. We are working with the developers to make sure they’re using the proper version of Xcode to rebuild their apps."
<strong>How do I protect myself against XcodeGhost?</strong>
 iOS users should immediately uninstall any infected iOS app listed here on their devices, or update to a newer version that has removed the malware. Resetting your iCloud password, and any other passwords inputted on your iOS device, is also strongly recommended as a precautionary measure.
 
 Developers should install official versions of Xcode 7 or Xcode 7.1 beta from Apple's website for free and avoid downloading the software from unofficial sources.
 
 
 Recent Mac and iOS Blog Stories
 • Nomad Review: The Pod is an Apple Watch Stand Made for Off-the-Grid Travel With its Built-In Battery
 • Buyer's Guide: Discounts on iPad Mini 3, Retina MacBook Pro, Apple Accessories and More
 • MacRumors Giveaway: Win OWC's Envoy Pro Mini 120GB SSD
 • Apple Outlines Fix for Unresponsive 'Slide to Upgrade' Screen on iOS 9
 • Apple's Revamped Company Store to Feature Full Product Lineup Alongside Corporate Gear
 • Apple Watch Sales Expand to Additional Resellers
 • Video Review: Logitech's 'Blok' Case Lineup for the iPad Air 2
 • Amazon Debuts New Fire TV with 4K Video & Alexa Voice Assistant
<br clear='all'/>

<a href="http://rc.feedsportal.com/r/238386017042/u/49/f/648327/c/35070/s/4a02fa2d/sc/28/rc/1/rc.htm" rel="nofollow"><img src="http://rc.feedsportal.com/r/238386017042/u/49/f/648327/c/35070/s/4a02fa2d/sc/28/rc/1/rc.img" border="0"/>[/url]

<a href="http://rc.feedsportal.com/r/238386017042/u/49/f/648327/c/35070/s/4a02fa2d/sc/28/rc/2/rc.htm" rel="nofollow"><img src="http://rc.feedsportal.com/r/238386017042/u/49/f/648327/c/35070/s/4a02fa2d/sc/28/rc/2/rc.img" border="0"/>[/url]

<a href="http://rc.feedsportal.com/r/238386017042/u/49/f/648327/c/35070/s/4a02fa2d/sc/28/rc/3/rc.htm" rel="nofollow"><img src="http://rc.feedsportal.com/r/238386017042/u/49/f/648327/c/35070/s/4a02fa2d/sc/28/rc/3/rc.img" border="0"/>[/url]

<img src="[url]http://da.feedsportal.com/r/238386017042/u/49/f/648327/c/35070/s/4a02fa2d/sc/28/a2.img" border="0"/>[/url]
<img src="[url]http://adchoice.feedsportal.com/r/238386017042/u/49/f/648327/c/35070/s/4a02fa2d/sc/28/ach.img" border="0"/>[/url]<img width="1" height="1" src="http://pi.feedsportal.com/r/238386017042/u/49/f/648327/c/35070/s/4a02fa2d/sc/28/a2t.img" border="0"/><img width="1" height="1" src="http://pi2.feedsportal.com/r/238386017042/u/49/f/648327/c/35070/s/4a02fa2d/sc/28/a2t2.img" border="0"/><img width='1' height='1' src='' border='0'/><div class="feedflare">
<img src="[url]http://feeds.feedburner.com/~ff/MacRumors-Front?d=yIl2AUoC8zA" border="0"></img>[/url] <img src="[url]http://feeds.feedburner.com/~ff/MacRumors-Front?d=6W8y8wAjSf4" border="0"></img>[/url] <img src="[url]http://feeds.feedburner.com/~ff/MacRumors-Front?d=qj6IDK7rITs" border="0"></img>[/url]
</div><img src="http://feeds.feedburner.com/~r/MacRumors-Front/~4/6gbDAkwlJfs" height="1" width="1" alt=""/>

Source: What You Need to Know About iOS Malware XcodeGhost
Logged
Pages: [1]   Go Up
  Print  
 
Jump to: