By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    How to Fight Rootkits -Kaspersky Daily
    1 year ago
    Faketoken Banking Trojan is Getting Widespread in 55 Countries
    1 year ago
    Explaining what exploits are and why they are so scary
    1 year ago
    Latest News
    Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution
    2 hours ago
    Fake CVE Phishing Campaign Tricks WordPress Users Into Installing Malware
    20 hours ago
    Patchstack Alliance Bounty Program Events for December
    3 days ago
    Your Smart Coffee Maker is Brewing Up Trouble
    3 days ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    Unscheduled update for WordPress fixes two critical vulnerabilities
    Unscheduled update for WordPress fixes two critical vulnerabilities
    1 year ago
    Windows 11 build 22621.457 (KB5016695) outs in Release Preview Channel
    1 year ago
    How to change time zone on Windows 11
    1 year ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    10 months ago
    Now you can speed up any video in your browser
    10 months ago
    How to restore access to a file after EFS or view it on another computer?
    10 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    11 months ago
  • How To
    How ToShow More
    How to stop, disable, and remove any Android apps — even system ones
    2 days ago
    Bigger, Better, Cooler in a 2U1N form factor
    Bigger, Better, Cooler in a 2U1N form factor
    3 days ago
    Vulnerability in crypto wallets created online in the early 2010s
    4 days ago
    Use Windows 11 features to inspire creativity, speed up everyday tasks
    5 days ago
    Windows brings nostalgia to the holidays with the return of Windows Ugly Sweaters, this year featuring the Bliss backdrop
    6 days ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    How to turn Wi-Fi On or Off on Windows 11
    1 month ago
    Roskomnadzor was asked to block another 51 VPN servicesSenator Artem Sheikin Pot
    3 weeks ago
    How to remove or replace image background in Photos for Windows 11
    3 weeks ago
    Latest News
    How to disable updates on Windows 10 Pro and Home
    1 day ago
    Change screen brightness on Windows 11
    3 days ago
    How to share Microsoft 365 Family subscription with other people
    5 days ago
    How to enable random MAC address for Wi-Fi on Windows 10
    5 days ago
  • Glossary
  • My Bookmarks
Reading: iOS Vulnerability Behind WireLurker Apple Malware Revealed
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
ThreatsWordpress Threats

iOS Vulnerability Behind WireLurker Apple Malware Revealed

Vitus White
Last updated: 13 October
Vitus White 1 year ago
Share
4 Min Read

Yesterday researchers said they discovered and disclosed to Apple, the vulnerability exploited by the WireLurker malware, which targeted iOS mobile devices via infections through USB connections to Mac OS X and Windows machines.

Masque-Attack-all-new-iOS-vulnerability_fb

The vulnerability is called “Masque” and it affects iOS 7.1.1, 7.1.2, 8.0, 8.1, and 8.1.1 beta. Perhaps most interestingly, while initial reports suggested that the malware could only infect iOS user-devices via USB connection, researchers from FireEye yesterday said that the Masque bug is also exploitable by SMS text messages and email. However, in order to infect via SMS or email, the attacker would have to compel a victim to follow a link leading to the malicious apps.

Researchers disclose a powerful #iOS vulnerability responsible for the #WireLurker #Apple #malware

Tweet

Technically, Masque gives attackers the ability to replace legitimate iOS apps with malicious ones without notification. In part, the flaw relates to an iOS enterprise provisioning failure to double check the identity of a given app against its digital certificate when the developer does not upload the application to the App Store.

So in this case, iOS did not flag WireLurker’s certificates, which were legitimately signed – albeit using a different certificate – because the malware merely uploaded the application directly to the user’s phone from the infected desktop or laptop. This is why, unlike earlier iOS malware, WireLurker had the capacity to infect non-jailbroken devices.

#WireLurker #Apple #Malware Targets Mac OS X Then iOS https://t.co/tAtWI93wrK #security pic.twitter.com/fKAsF8ArzL

— Kaspersky Lab (@kaspersky) November 6, 2014

FireEye says that WireLurker is the only in the wild attack targeting the Masque vulnerability, but that it also appears to have been circulated among criminals. The Masque bug remains unpatched. To Apple’s credit, they moved fast to invalidate the certificates used by the malicious malware.

The need for anti-malware protection on Mac OS X devices cannot be overstated.

Shortly after the security firm Palo Alto Networks published their WireLurker findings last week, the group responsible for the malware shut their operation down. However, when it was still up and running, it aimed to infect Windows and Mac machines, where it would lie dormant until the infected user attached an iPhone or iPod to his or her personal computer.

When and if that occurred, the malware then searched the connected iOS device for the presence of a few popular applications. If present, WireLurker uninstalled those apps and replaced them with fake, trojanized replicas. It is not clear what data the malware ultimately sought.

WireLurker is no more. #WireLurker is gone: https://t.co/yjdK4xgX06 pic.twitter.com/gSGd2tSELf

— Eugene Kaspersky (@e_kaspersky) November 7, 2014

The only users that would have been impacted by WireLurker were users who had downloaded applications from a third-party application marketplace in China called Maiyadi. Palo Alto researchers said, 467 infected OS X apps have been found on Maiyadi and those apps have been downloaded more than 350,000 times as of Oct. 16, by more than 100,000 users.

“The need for anti-malware protection on Mac OS X devices cannot be overstated,” explained Kaspersky’s global research and analysis team in a Securelist report. “It’s not only that your Mac OS X machine can get infected, but WireLurker showed us how the infection can move from your Mac to your iPhone. The good news is: there are plenty of options to chose from out there, including our own Kaspersky Internet Security for Mac.”


Source: kaspersky.com

Translate this article

TAGGED: Apple, Authentication, Malware, Security, Threats, Windows
Vitus White October 13, 2022 October 7, 2022
Share This Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution
Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution
Wordpress Threats 5 hours ago
Fake CVE Phishing Campaign Tricks WordPress Users Into Installing Malware
Fake CVE Phishing Campaign Tricks WordPress Users Into Installing Malware
Wordpress Threats 23 hours ago
How to disable updates on Windows 10 Pro and Home
News 1 day ago
How to stop, disable, and remove any Android apps — even system ones
How To 2 days ago
Patchstack Alliance Bounty Program Events for December
Patchstack Alliance Bounty Program Events for December
Wordpress Threats 3 days ago

You Might Also Like

Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution
Wordpress Threats

Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution

5 hours ago
Fake CVE Phishing Campaign Tricks WordPress Users Into Installing Malware
Wordpress Threats

Fake CVE Phishing Campaign Tricks WordPress Users Into Installing Malware

23 hours ago
News

How to disable updates on Windows 10 Pro and Home

1 day ago
How To

How to stop, disable, and remove any Android apps — even system ones

2 days ago
Show More

Related stories

Several Critical Vulnerabilities including Privilege Escalation, Authentication Bypass, and More Patched in UserPro WordPress Plugin
BridesMaid – neuron writes toasts For those very occasions when you need to give out a powerful
The other day Yandex pleased us with the announcement of a new Midi station – an excellent reason to listen
REMIX – remixes of pictures from neural networksCreate, share and correct works
How to download Diablo IV for free and absolutely legallyBlizzard has opened a free
Rostelecom employees were forced to abandon Android and iOS in favor of Aurora.
Previous Next

10 New Stories

Your Smart Coffee Maker is Brewing Up Trouble
Bigger, Better, Cooler in a 2U1N form factor
Change screen brightness on Windows 11
Earn up to $10,000 for Vulnerabilities in WordPress Software
Fake CVE-2023-45124 Phishing Scam Tricks Users Into Installing Backdoor Plugin
Short-URL Services May Hide Threats
Previous Next
Hot News
Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution
Fake CVE Phishing Campaign Tricks WordPress Users Into Installing Malware
How to disable updates on Windows 10 Pro and Home
How to stop, disable, and remove any Android apps — even system ones
Patchstack Alliance Bounty Program Events for December
10alert.com10alert.com
Follow US
© 10 Alert Network. All Rights Reserved.
  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?