Close ad

Inattentive and careless iOS users face additional dangers. Just a week after the discovery WireLurker malware security company FireEye has announced that it has discovered another security hole in iPhones and iPads that can be attacked using a technique called a "Masque Attack". It can emulate or replace existing applications through fake third-party applications and subsequently obtain user data.

Those who download applications to iOS devices exclusively via the App Store should not be afraid of the Masque Attack, because the new malware works in such a way that the user downloads an application outside of the official software store, to which a fraudulent email or message (for example, containing a download link new version of the popular game Flappy Bird, see video below).

Once the user clicks on the fraudulent link, they will be taken to a web page asking them to download an app that looks like Flappy Bird, but is actually a fake version of Gmail that reinstalls the original app legitimately downloaded from the App Store. The application continues to behave in the same way, it just uploads a Trojan horse into itself, which obtains all personal data from it. The attack may not only concern Gmail, but also, for example, banking applications. In addition, this malware can also access the original local data of applications that may have already been deleted, and obtain, for example, at least saved login credentials.

[youtube id=”76ogdpbBlsU” width=”620″ height=”360″]

Fake versions can replace the original app because they have the same unique identification number that Apple gives to apps, and it is very difficult for users to distinguish one from the other. The hidden fake version then records e-mail messages, SMS, phone calls and other data, because iOS does not intervene against applications with identical identification data.

Masque Attack can't replace default iOS apps like Safari or Mail, but it can easily attack most apps downloaded from the App Store and is potentially a bigger threat than the WireLurker discovered last week. Apple reacted quickly to WireLurker and blocked company certificates through which applications were installed, but Masque Attack uses unique identification numbers to infiltrate existing applications.

Security firm FireEye found that the Masque Attack works on iOS 7.1.1, 7.1.2, 8.0, 8.1 and 8.1.1 beta, and Apple is said to have reported the problem in late July this year. However, the users themselves can protect themselves against the potential danger very easily - just do not install any applications outside the App Store and do not open any suspicious links in e-mails and text messages. Apple has not yet commented on the security flaw.

Source: Cult Of Mac, MacRumors
Topics: ,
.