Welcome to Your Daily Spot! Support us and become a Pro.
  Your Daily Spot
  Your Daily Spot
  • Hub
    • Animes
    • Cartoons
    • Tech
  • Apps
  • Video Games
    • Action
    • First-Person Shooter >
      • Call Of Duty Tips & Tricks
      • Destiny
      • Call of Duty®: Advance Warfare
      • Counter Strike >
        • CS:GO Video
    • Racing
    • Simulation
    • Sports
    • Strategy
    • Online Games >
      • MapleStory
    • Vainglory >
      • Find Allies
      • ShinKaigan
  • News
    • Apple
    • Entertainment
    • Gaming
    • Tech
  • About Us
    • Blog
    • Partners >
      • Apply
  • Contact
    • Team
    • Discord
  • Upcoming
  • Deals
  • Pro

Headline of The day!

New iOS malware spreads through infected desktop software

11/8/2014

Comments

 
Picture
iPhone users are usually considered safe from malware, but a new report from Palo Alto Networks suggests that reputation may be about to change. Palo Alto's researchers have discovered a bug called Wirelurker, which the company says may have already impacted hundreds of thousands of users. The bug is primarily spreading through the Maiyadi App Store, a third-party source for OS X software in China, and researchers estimated the infected apps have been downloaded 356,104 times already. Once the computer is infected, Wirelurker spreads to iOS devices that connect over USB, rewriting existing programs on the device through binary file replacement. It's the first such bug that can infect iPhones that haven't been jailbroken, using the rarely examined enterprise provisioning system, intended to allow large companies to deploy software without going through the app store approval process.

Everything I've read so far in the WireLurker white paper seems not only completely plausible, but easy to pull off with libimobiledevice.

— Jonathan Zdziarski (@JZdziarski) November 6, 2014
Ironically, once Wirelurker gains access to a non-jailbroken iPhone, the program simply side-loads a non-malicious comic book app onto the phone, using a forged enterprise provisioning certificate. Palo Alto researchers suspect it's a test payload to ensure the system works before moving on to more profitable ends. For jailbroken phones, the malware rewrites the apps for the TaoBao and AliPay apps (Alibaba's applications for auctions and payments, respectively) so as to harvest payment information.

But even with its current limitations, the bug represents the first serious compromise of iOS security, and presents security researchers with a number of novel attack vectors that must now be secured. Palo Alto Networks has already developed software that will let users test for the bug, but in the meantime, they recommend users avoid third-party app stores and avoid using USB-based chargers from unknown sources. "This malware is under active development," the report says, "and its creator’s ultimate goal is not yet clear."
Source
Comments
comments powered by Disqus

    Headlines


    Picture
    Instagram launches redesigned app and icon
    Picture
    Warner Bros. will release 35 4K Blu-ray movies this year in glorious HDR
    Picture
    Samsung's new Tizen-powered remote could rule your smart home
    Picture
    FAA announces drone owners must register by February 19th, 2016

    Archives

    May 2016
    January 2016
    December 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014

    Categories

    All
    4K
    5K
    Anime
    Apple
    Apple Music
    Apple Watch
    Apps
    Entertainment
    Ferrari
    Funny Videos
    Gear S
    Google
    Headline
    HP
    IMac
    IOS
    IPad
    IPhone
    Lamboghini
    Microsoft
    Nexus
    Nokia
    OS X
    Pranks
    Samsung
    Samsung Galaxy
    Sony
    Tech
    Tech Toys
    TV
    Video Games
    Vizio
    Windows 10
    Xiaomi

Copyright © 2014-2016 Your Daily Spot. All Rights Reserved.
v2.1.4 August 11, 2015
Terms of Service
Sitemap