A malicious app campaign which infiltrated Apple’s App Store is far more extensive than at first thought, according to security researchers.
The original report from Palo Alto Networks five days ago claimed that 39 malicious apps had passed Apple’s strict vetting process to end up on its China App Store.
Even this small number was thought to potentially affect hundreds of millions of users as it included versions of popular software including messaging service WeChat.
However, FireEye said yesterday that the number of affected apps is actually closer to 4000.
The hackers managed to get malicious apps onto the App Store by producing a malicious version of Apple’s Xcode compiler software – XcodeGhost – which they promoted to developers via forums and the like.
The malware is said to steal user and device info and transmit it back to a C&C server. It was originally thought the attackers could then use the information to craft phishing attacks requesting iCloud passwords.
However, a new blog from Appthority suggests the author of this particular strain decided not to implement such “harmful behaviors.”
“The framework itself contains no code to display login prompts or alerts of any kind that could be used to phish credentials (the alert has no field for text input). The only way to launch a phishing attack using this framework would be to send the response to open a URL pointing to a malicious website,” Appthority said.
This article has been extracted from http://www.infosecurity-magazine.com, please click on this link to read the article in full http://www.infosecurity-magazine.com/news/researchers-4000-malicious-apple/
Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including: