Security researchers have probed additional into the vulnerability in non-jailbroken iOS seven and iOS eight devices that were exploited by the WireLurker malware.
Dubbed a “Masque Attack”, the maneuver permits hackers to put in iOS apps on iPhone or iPad via email or text message. The attack takes advantage of a security weakness that enables associate degree iOS app with a similar filename – no matter developer – to exchange the legitimate app on a post-iOS seven device whereas keeping all of the user’s information.
The overwhelming majority (95 per cent) of all iOS devices area unit doubtless vulnerable, consistent with researchers at security business FireEye.
A demo video place along by FireEye shows however it would be doable to exchange a true Gmail app with a faux utility so as to steal the user’s login credentials, likewise as collect all of their emails.
So the masquerade Attack creates a way to exchange real apps with malware on non-jailbroken iOS devices mistreatment social engineering trickery. masquerade Attacks will happen utterly over the wireless network while not wishing on associate degree infected-computer-to-iThing USB affiliation to unfold WireLurker.
The masquerade Attack conjointly creates a way for hackers to with success skirt the detection by mobile device management code by taking advantage of Apple’s personal Apis, that area unit sometimes reserved for normal iOS apps.
"Apple has been wise to in July 2014 concerning masquerade Attack," an interpreter told El Reg. "As the way as we all know, they're engaged on a fix."
"This vulnerability exists as a result of iOS does not enforce matching certificates for apps with a similar bundle symbol and also the assailant will craft the message shown to the user at install time,” the interpreter continuing. “After the malware replaces associate degree authentic app, the authentic app's native information weren't removed and this information were accessible to the malware."
"Wirelurker is that the initial proverbial malware mistreatment the masquerade attack. luckily, it hasn't conducted additional powerful attacks," she other.
FireEye's public unharness of data concerning the masquerade Attack comes days once the invention of WireLurker, the primary malware capable of spreading onto non-jailbroken Apple iOS devices from infected raincoat OS X systems.
If WireLurker cask up the wide command assumption that non-jailbroken iPhones and iPads were immune from malware, then the discharge of data concerning the masquerade Attack additional stirs the pot.
Pending the supply of a patch from Apple, FireEye advises iThings users to solely install apps from Apple’s official App Store or the user’s own organization, among alternative precautions.
Jeremy Linden, senior security product manager at mobile security firm Lookout, aforementioned that the masquerade Attack diagrammatical a modification in the direction in wherever threats would possibly return from and appearance like.
“In the past these sorts of vulnerabilities concerned dropping associate degree app on your phone, however one issue that’s new concerning masquerade Attack is that it uses associate degree icon that’s already on your phone and replaces the app behind it," Linden commented. "If you only saw a random banking app on page five of your iPhone, you’re not planning to be desperate to click it and enter your login credentials. however, if you’re already trusting this icon, you might. Classic social engineering at play."
Linden aforementioned that there have been a variety of mitigating factors, in the main the requirement for associate degree assailant to "obtain associate degree enterprise provisioning profile or steal one, neither of that area unit trivial".
In addition, there would conjointly perpetually be a warning to the user, that ought to look suspicious as a result of it’s not one thing you'd unremarkably see in iOS