The United States Computer Emergency Readiness Team, part of the U.S. Department of Homeland Security, has issued a formal alert on the Apple iOS 'Masque Attack'.
A few days ago we reported that FireEye mobile security researchers discovered an iOS security flaw that lets attackers replace your real apps with malware. FireEye found that when installing an app using enterprise/ad-hock provisioning, it could replace a genuine app if it had the same bundle identifier.
Here's the official alert number TA13-317A:
----- Systems Affected iOS devices running iOS 7.1.1, 7.1.2, 8.0, 8.1, and 8.1.1 beta.
Overview A technique labeled “Masque Attack” allows an attacker to substitute malware for a legitimate iOS app under a limited set of circumstances.
Description Masque Attack was discovered and described by FireEye mobile security researchers.[1] (link is external) This attack works by luring users to install an app from a source other than the iOS App Store or their organizations’ provisioning system. In order for the attack to succeed, a user must install an untrusted app, such as one delivered through a phishing link.
This technique takes advantage of a security weakness that allows an untrusted app—with the same “bundle identifier” as that of a legitimate app—to replace the legitimate app on an affected device, while keeping all of the user’s data. This vulnerability exists because iOS does not enforce matching certificates for apps with the same bundle identifier. Apple’s own iOS platform apps, such as Mobile Safari, are not vulnerable.
Impact An app installed on an iOS device using this technique may: ● Mimic the original app’s login interface to steal the victim’s login credentials. ● Access sensitive data from local data caches. ● Perform background monitoring of the user’s device. ● Gain root privileges to the iOS device. ● Be indistinguishable from a genuine app.
Solution iOS users can protect themselves from Masque Attacks by following three steps: ● Don’t install apps from sources other than Apple’s official App Store or your own organization. ● Don’t click “Install” from a third-party pop-up when viewing a web page. ● When opening an app, if iOS shows an “Untrusted App Developer” alert, click on “Don’t Trust” and uninstall the app immediately.
Further details on Masque Attack and mitigation guidance can be found on FireEye’s blog [1] (link is external). US-CERT does not endorse or support any particular product or vendor. -----
Check out more details on Masque Attack and a video demo at the link below...
Would you like to be notified when someone replies or adds a new comment?
Yes (All Threads)
Yes (This Thread Only)
No
Notifications
Would you like to be notified when we post a new Apple news article or tutorial?
Yes
No
Comments (11)
Comments are closed for this article.
0
Rajesh kumar - November 23, 2014 at 3:55pm
Latest news on apple products....How to tutorials , how to videos, how to jailbreak, how to install tweaks, how to get cracked apps and much more, please visit www.iphoneclinic.net
0
Alex - November 14, 2014 at 2:32am
Great -_-
0
iProService - November 13, 2014 at 11:06pm
Is there a jailbreak tweak that fixes this yet? Ryan Petrich (@rpetrich) is usually on the ball in creating patches for these security issues.
0
Adam ate the apple - November 13, 2014 at 10:14pm
Sponsored by US Government
0
tng - November 13, 2014 at 9:56pm
Actually this affects both Jailbraked phones and Non.
1
aa2007 - November 13, 2014 at 9:40pm
Yeah we know iPhone sux nothing new
1
lemon4611 - November 13, 2014 at 9:45pm
Only if you can't afford one and have to get the Samsung welfare phone. lol
0
gamerscul9870 - November 13, 2014 at 10:07pm
Yeah we all know how much you are too picky to ignore the best phone. Nothing provable.
0
Hack fest - November 13, 2014 at 9:16pm
Maybe Apple could roll out 7.0.6 for a while?
0
Hack fest - November 13, 2014 at 9:12pm
So any firmware that works with a Pangu jailbreak is affected? Guess I shouldn't have upgraded from 7.0.4 yesterday after u guys said we should do so immediately.....wth?
0
dk2013 - November 13, 2014 at 9:31pm
You turn your device's security and health over to an unknown group of hackers from China, there are no guarantees about what will happen. I know it's fun to tweak, but you really have to ask yourself if it's worth the risk. For me the answer is nope.