Close ad

On the website of Felix Kraus, the developer behind the program fast lane, a very interesting piece of information has emerged today regarding the latest method of conducting a phishing attack that is currently possible to perform on the iOS platform. This attack targets the device user's password and is dangerous mainly because it looks really real. And to such an extent that the attacked user could lose his password on his own initiative.

Felix on his own site represents a new concept of a phishing attack that can get onto iOS devices. This is not happening yet (although it has been possible for several years), it is only a demonstration of what is possible. Logically, the author does not display the source code of this hack on his website, but it is not unlikely that someone will try it.

Basically, it's an attack that uses an iOS dialog box to get the user's Apple ID account password. The problem is that this window is indistinguishable from the real one that appears when you authorize actions on iCloud or the App Store.

Users are used to this pop-up and basically fill it automatically when it appears. The problem arises when the originator of this window is not the system as such, but a malicious attack. You can see what this type of attack looks like in the images in the gallery. Felix's website describes exactly how such an attack can occur and how it can be exploited. It is enough that the installed application in the iOS device contains a specific script that initializes this user interface interaction.

Defense against this type of attack is relatively easy, but few would think to use it. If you ever get a window like this and you suspect something is not quite right, just press the Home Button (or its software equivalent…). The app will crash into the background, and if the password dialog was legitimate, you'll still see it on your screen. If it was a phishing attack, the window will disappear when the application is closed. You can find more methods at author's website, which I recommend reading. It's probably only a matter of time before similar attacks spread to apps in the App Store.

Source: krausefx

.