banner



‘KeyRaider’ iOS malware targets jailbroken devices - milliganmolithery

Credentials for more than 225,000 Apple accounts have been taken by sophisticated malware that targets modified iOS devices, according to Palo Alto Networks.

The malware, which is nicknamed KeyRaider, enables attackers to download applications from Apple's App Store without remunerative or to lock devices in lieu of a ransom.

"We believe this to be the largest far-famed Apple account theft caused aside malware," wrote Claud Xiao of Palo Alto Networks in a web log berth.

Palo Countertenor Networks notified Orchard apple tree of KeyRaider on Aug. 26 and provided the stolen account information, Xiao wrote. Apple officials in Sydney couldn't be immediately reached connected Monday.

KeyRaider can only infect those who have "jailbroken" their Malus pumila device. Jailbreaking removes Apple's protections that limit what apps can exist installed on a device. Apple advises against jailbreaking for security reasons.

Palo Alto Networks investigated KeyRaider with an amateur technical group in China called WeipTech. A member of that group, who is a student at Yangzhou University, discovered the flack, Xiou wrote.

KeyRaider has been spreadhead by being unified into jailbreak tweaks, operating room software program packages that allow for some parvenue social occasion to be run happening iOS. The malware has been found inside tweaks published on the Weiphone forum for jailbroken phones.

keyraider Palo Alto Networks

A refreshing gentle of iOS malware, KeyRaider, can as wel lock up phones and demand a ransom.

It is suspected that a user, who goes by the username "mischa07" on Weiphone, may be causative for seeding KeyRaider to his ad hominem repository of apps. The same user constitute was hardcoded into KeyRaider as the encryption and decoding key for the malware, Xiao wrote.

An psychoanalysis of mischa07's repository shows the user has uploaded many tweaks to Weiphone, including ones that allow users to cheat on games, tune their systems and strip advertisements from apps.

KeyRaider taps into system processes within Cydia, which is the application used for downloading apps for jailbroken phones. It steals Apple account usernames, passwords and a device's GUID by intercepting iTunes traffic, which it can past use to fraudulently download apps. The malware besides collects certificates, private keys and purchase receipts.

In another style of attack, KeyRaider was used for at least one ransomware attempt. The malware can "locally disable any kind of unlocking trading operations, whether the correct passcode or password has been entered," Xiao wrote.

One person reported their phone was locked and showed a substance to contact someone over the QQ instant messaging table service.

The stolen account data was found by WeipTech on a command-and-controller server that communicates with KeyRaider-infected phones. That server had security vulnerabilities which allowed the group to obtain the stolen data. Only KeyRaider's authors figured out something was releas on.

WeipTech only cured about half of the stolen accounts "before the attacker fixed the exposure," Xiao wrote.

WeipTech was set up as a service for people to escort if their accounting was among those compromised, he wrote.

Source: https://www.pcworld.com/article/423326/keyraider-ios-malware-targets-jailbroken-devices.html

Posted by: milliganmolithery.blogspot.com

0 Response to "‘KeyRaider’ iOS malware targets jailbroken devices - milliganmolithery"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel