Apple to List Top 25 Apps Compromised by XcodeGhost Malware

Apple to List Top 25 Apps Compromised by XcodeGhost Malware

Posted by · 8385 views · Translate

Apple will list the top 25 apps compromised by XcodeGhost malware and make it easier for Chinese app developers to download its development tools, reports Reuters.

In the wake of the first major breach on its outlet for distributing iPhone and iPad software, Apple marketing chief Phil Schiller told Chinese news site that it will offer domestic downloads within China of its software for developing apps.

Hundreds of apps were embedded with malware and made their way onto the App Store after developers downloaded a compromised version of Xcode. They resorted to downloading Xcode from an unofficial server because of slow speeds downloading from Apple's official servers overseas.

Schiller said that Apple will list the top 25 compromised apps so that customers can delete and update them. Apple is not aware of any cases where tainted apps have been used to transit customer data.

More details on XcodeGhost can be found here. Developers can check if their Xcode is valid by following these steps.

Read More

Apple to List Top 25 Apps Compromised by XcodeGhost Malware

Vida - September 23, 2015 at 5:57am
There is vomit all around it
The iDevice Pro - September 22, 2015 at 9:49pm
Thanks, azzholes. What happened to the days when Apple parched a security flaw within 24 hours? Down the shitter, those days are...Apple is no longer all about innovation and the consumer. A very sad time, indeed.
Nat - September 22, 2015 at 10:25pm
What irony that is that shows how sad you are not to accept the truth in the first place. It's only the App Store being hacked, not the iOS itself. Apple is still about what they were meant for that continues to show why others need them. It wouldn't be possible without apple no matter who runs it.
iOS developer - September 23, 2015 at 2:11am
The AppStore wasn't hacked either. Extremely dumb developers downloaded xcode from a 3rd party website. That software is what was compromised.
Nat - September 23, 2015 at 2:30am
Ok. Thanks for proving this situation how it all went down.
7 More Comments