'Masque Attack' Vulnerability Allows Malicious Third-Party iOS Apps to Masquerade as Legitimate AppsJust a week after new
WireLurker iOS malware surfaced, there's yet another vulnerability in iOS that can potentially be used to install malicious third-party apps. Called Masque Attack for its ability to emulate and replace existing legitimate apps, the flaw was discovered by
security research company FireEye.
Masque Attack works by luring users to install an app outside of the iOS App Store, by clicking a phishing link in a text message or email. For example, in a demo video, an SMS message with a link attached was sent with the following text "Hey, check this out, the New Flappy Bird."
Once clicked, the link directs to a website, which prompts the user to install an app. The app in the video isn't Flappy Bird, but a malicious version of Gmail that installs directly over the legitimate version of Gmail downloaded from the App Store, making it virtually undetectable.
<center><iframe src="//www.youtube.com/embed/76ogdpbBlsU" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></center>
Masque Attack can be used to install fake versions of apps over legitimate App Store versions using iOS enterprise provision profiles, which are used for beta testing or by companies to distribute apps to employees without the need for the official App Store.
As explained in a blog post, as long as both the existing App Store app and the malicious imposter app use the same bundle identifier (a unique identifying number), the fake version will replace the actual app in a way that's very difficult for the user to detect. The hidden malicious app is able to upload email messages, SMS messages, phone calls, and more, which is possible because "iOS doesn't enforce matching certificates for apps with the same bundle identifier."
While the attack cannot replace stock Apple apps like Safari and Mail, it is able to affect apps that have been installed via the App Store, and has the potential to be much more dangerous than other vulnerabilities like WireLurker.
Masque Attacks can pose much bigger threats than WireLurker. Masque Attacks can replace authentic apps,such as banking and email apps, using attacker's malware through the Internet. That means the attacker can steal user's banking credentials by replacing an authentic banking app with an malware that has identical UI. Surprisingly, the malware can even access the original app's local data, which wasn't removed when the original app was replaced. These data may contain cached emails, or even login-tokens which the malware can use to log into the user's account directly.
FireEye has gotten the attack to work on iOS 7.1.1, 7.1.2, 8.0, 8.1, and the 8.1.1 beta. The company notified Apple about the vulnerability on July 26, but iOS users can protect themselves by not installing apps from third-party sources other than the official App Store, avoiding clicking on "install" popups in SMS messages or third-party websites, and avoiding apps/uninstalling apps that give an "Untrusted App Developer" alert.
iOS 7 users can check to see if they've been the victim of an attack by going to Settings --> General --> Profiles to see what provisioning profiles are installed. iOS 8 devices do not show installed provisioning profiles, making it more difficult to detect an attack.
Recent Mac and iOS Blog Stories •
Target Offering Gift Cards up to $140 With iPad, iPhone Purchase on Black Friday •
Android Slips as Apple Gains Enterprise Market Share in Q3 2014 •
Apple Adds Genius Bar Reservations to Product Support Options •
Buyer's Guide: Deals on Retina iMac, Older iPads, Apple Accessories, and More •
Spotify Connect for Computers Turns An iPhone Into a Remote Control for Mac •
United Airlines Spending $120 Million on Upgrading New Jersey Airport Terminal with iPads •
Lenovo Borrows Heavily From Apple in New S90 Smartphone Marketing Push •
Monument Valley Expansion 'Forgotten Shores' Coming to iOS November 13<img width='1' height='1' src='
http://rss.feedsportal.com/c/35070/f/648327/s/4057bbb6/sc/4/mf.gif' border='0'/><br clear='all'/>
<a href="
http://da.feedsportal.com/r/211597388966/u/49/f/648327/c/35070/s/4057bbb6/sc/4/rc/1/rc.htm" rel="nofollow"><img src="
http://da.feedsportal.com/r/211597388966/u/49/f/648327/c/35070/s/4057bbb6/sc/4/rc/1/rc.img" border="0"/>[/url]
<a href="
http://da.feedsportal.com/r/211597388966/u/49/f/648327/c/35070/s/4057bbb6/sc/4/rc/2/rc.htm" rel="nofollow"><img src="
http://da.feedsportal.com/r/211597388966/u/49/f/648327/c/35070/s/4057bbb6/sc/4/rc/2/rc.img" border="0"/>[/url]
<a href="
http://da.feedsportal.com/r/211597388966/u/49/f/648327/c/35070/s/4057bbb6/sc/4/rc/3/rc.htm" rel="nofollow"><img src="
http://da.feedsportal.com/r/211597388966/u/49/f/648327/c/35070/s/4057bbb6/sc/4/rc/3/rc.img" border="0"/>[/url]
<img src="[url]http://da.feedsportal.com/r/211597388966/u/49/f/648327/c/35070/s/4057bbb6/sc/4/a2.img" border="0"/>[/url]<img width="1" height="1" src="
http://pi.feedsportal.com/r/211597388966/u/49/f/648327/c/35070/s/4057bbb6/sc/4/a2t.img" border="0"/><div class="feedflare">
<img src="[url]http://feeds.feedburner.com/~ff/MacRumors-Front?d=yIl2AUoC8zA" border="0"></img>[/url]
<img src="[url]http://feeds.feedburner.com/~ff/MacRumors-Front?d=6W8y8wAjSf4" border="0"></img>[/url]
<img src="[url]http://feeds.feedburner.com/~ff/MacRumors-Front?d=qj6IDK7rITs" border="0"></img>[/url]
</div><img src="
http://feeds.feedburner.com/~r/MacRumors-Front/~4/tBfwg5yQuEw" height="1" width="1"/>
Source:
'Masque Attack' Vulnerability Allows Malicious Third-Party iOS Apps to Masquerade as Legitimate Apps