Breaking News

ASUS Announces ProArt Router PRT-BE5000 and ProArt Switch PQG-U1080 CORSAIR Expands the Popular FRAME Series Case Lineup DeepCool Launches the LT360 VISION ARGB Noctua and Asetek Announce Flagship AIO Liquid Coolers Toshiba Begins Sampling of 30-34 TB SMR Nearline Hard Disk Drives

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Researchers Identify iOS Espionage App

Researchers Identify iOS Espionage App

Smartphones Feb 4,2015 0

In a research on Operation Pawn Storm, Trendmicro found one interesting poisoned pawn-spyware specifically designed for espionage on iOS devices. While spyware targeting Apple users is highly notable by itself, this particular spyware is also involved in a targeted attack.

Operation Pawn Storm is an active economic and political cyber-espionage operation that targets a wide range of entities, like the military, governments, defense industries, and the media.

The actors of Pawn Storm tend to first move a lot of pawns in the hopes they come close to their actual, high profile targets. When they finally successfully infect a high profile target, they might decide to move their next pawn forward: advanced espionage malware.

The iOS malware Trendmicro found is among those advanced malware. The security intelligence firm believes the iOS malware gets installed on already compromised systems, and it is very similar to next stage SEDNIT malware that had been found for Microsoft Windows’ systems.

Trendmicro found two malicious iOS applications in Operation Pawn Storm. One is called XAgent (detected as IOS_XAGENT.A) and the other one uses the name of a legitimate iOS game, MadCap (detected as IOS_ XAGENT.B). After analysis, the firm concluded that both are applications related to SEDNIT.

The obvious goal of the SEDNIT-related spyware is to steal personal data, record audio, make screenshots, and send them to a remote command-and-control (C&C) server. As of this publishing, the C&C server contacted by the iOS malware is live.

After being installed on iOS 7, the XAgent app’s icon is hidden and it runs in the background immediately. And it will restart almost immediately after trying to terminate it by killing the process.

Installing the malware into an iOS 8 device yields different results. The icon is not hidden and it also cannot restart automatically. This suggests that the malware was designed prior to the release of iOS 8 last September 2014.

The app is designed to collect all kind of information on an iOS device. It is able to perform the following routines:

  • Collect text messages
  • Get contact lists
  • Get pictures
  • Collect geo-location data
  • Start voice recording
  • Get a list of installed apps
  • Get a list of processes
  • Get the Wi-Fi status

Besides collecting information from the iOS device, the app sends the information out via HTTP. It uses POST request to send messages, and GET request to receive commands.

Trendmicro has not identified the exact methods of installing the malware. However, the iOS device doesn’t have to be jailbroken per se. Researchers have seen one instance wherein a lure involving XAgent simply says "Tap Here to Install the Application." The app uses Apple’s ad hoc provisioning, which is a standard distribution method of Apple for iOS App developers. Through ad hoc provisioning, the malware can be installed simply by clicking on a link.

There may be other methods of infection that are used to install this particular malware. One possible scenario is infecting an iPhone after connecting it to a compromised or infected Windows laptop via a USB cable.

Tags: iosAppleVirus
Previous Post
Sony Pictures Entertainment Remains in a State of Breach, Says Research Firm
Next Post
FCC Chairman Wheeler Proposes New Rules for Protecting the Open Internet

Related Posts

  • Apple introduces AirPods Max 2

  • Apple introduces the new M5 Pro/Max powered laptops and new Studio Display

  • Apple introduces iPhone 17e and new new iPad Air

  • Apple introduces new AirTag with expanded connectivity range and improved findability

  • Apple introduces Digital ID

  • Apple unleashes M5 CPU and new devices

  • Apple debuts iPhone 17, Pro, Max, Air, Watch Series 11, Watch Ultra 3, Watch SE 3, AirPods Pro 3

  • Apple unveils Mac Studio featuring M4 Max and new M3 Ultra

Latest News

ASUS Announces ProArt Router PRT-BE5000 and ProArt Switch PQG-U1080
Enterprise & IT

ASUS Announces ProArt Router PRT-BE5000 and ProArt Switch PQG-U1080

CORSAIR Expands the Popular FRAME Series Case Lineup
Cooling Systems

CORSAIR Expands the Popular FRAME Series Case Lineup

DeepCool Launches the LT360 VISION ARGB
Cooling Systems

DeepCool Launches the LT360 VISION ARGB

Noctua and Asetek Announce Flagship AIO Liquid Coolers
Cooling Systems

Noctua and Asetek Announce Flagship AIO Liquid Coolers

Toshiba Begins Sampling of 30-34 TB SMR Nearline Hard Disk Drives
Enterprise & IT

Toshiba Begins Sampling of 30-34 TB SMR Nearline Hard Disk Drives

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Arctic Liquid Freezer III 360 Pro Argb

Arctic Liquid Freezer III 360 Pro Argb

Soft2bet and the unseen hardware that makes instant play possible

Soft2bet and the unseen hardware that makes instant play possible

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed