Breaking News

DeepCool Launches the LT360 VISION ARGB Noctua and Asetek Announce Flagship AIO Liquid Coolers Toshiba Begins Sampling of 30-34 TB SMR Nearline Hard Disk Drives ASUS ROG Strix Laptop Lineup Returns With the Latest Intel Core Ultra 9 290HX Plus Processors EnGenius Brings AI-Powered Analytics and Sophisticated Cloud Management to Existing ONVIF Cameras

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

 WireLurker Malware Targets  Apple Devices

WireLurker Malware Targets Apple Devices

Enterprise & IT Nov 6,2014 0

Researchers at Palo Alto Networks have discoverd a new family of iOS and OS X malware distributed through trojanized and repackaged Apple OS applications. This new family, dubbed WireLurker, can infect installed iOS applications similar to how a traditional virus would, as it can install third-party applications on non-jailbroken iOS devices through enterprise provisioning. The malware attacks iOS devices through OS X via USB and generates of malicious iOS applications through binary file replacement.

Palo Alto analyzed three versions of WireLurker.

If someone downloaded a Mac OS X desktop application from Maiyadi, WireLurker came along with it. WireLurker then waits for when an iOS device is connected by a USB cable. A second version of WireLurker checks if the Apple device was jailbroken -- if it allows users to run applications not approved by Apple. Then it would look to see if applications such as Taobao, Alipay or Meitu, a photo editing application, were installed. If so, it would copy the application to the desktop Mac, infect it with WireLurker and copy it back to the device.

But a third iteration of WireLurker targets iOS devices that are not jailbroken as well. In that version, WireLurker used a digital certificate that Apple issues to enterprise developers so they can run their own applications in-house that do not appear on the App Store.

Some 467 Mac OS X applications offered on a Chinese third-party application store called Maiyadi were found to have been seeded with WireLurker, including "The Sims 3," and "Pro Evolution Soccer 2014," according to Palo Alto’s research paper.

Over the last six months, those applications and others have been downloaded 356,104 times and may have impacted hundreds of thousands of users, a firm's paper said.

Palo Alto Networks has released signatures to detect all WireLurker Command & Control communication traffic. The firm recommended that customers using OS X or iOS devices deploy a strict policy for blocking WireLurker traffic using the Palo Alto Networks enterprise security platform.

Palo Alto Networks has notified Apple about the malware a couple weeks ago.

"We are aware of malicious software available from a download site aimed at users in China, and we?ve blocked the identified apps to prevent them from launching," Apple said. "As always, we recommend that users download and install software from trusted sources."

Tags: malwareApple
Previous Post
Acer Reports Q3 Profit
Next Post
Lenovo Posts Second Quarter Profit

Related Posts

  • Apple introduces AirPods Max 2

  • Apple introduces the new M5 Pro/Max powered laptops and new Studio Display

  • Apple introduces iPhone 17e and new new iPad Air

  • Apple introduces new AirTag with expanded connectivity range and improved findability

  • Apple introduces Digital ID

  • Apple unleashes M5 CPU and new devices

  • Apple debuts iPhone 17, Pro, Max, Air, Watch Series 11, Watch Ultra 3, Watch SE 3, AirPods Pro 3

  • Apple unveils Mac Studio featuring M4 Max and new M3 Ultra

Latest News

DeepCool Launches the LT360 VISION ARGB
Cooling Systems

DeepCool Launches the LT360 VISION ARGB

Noctua and Asetek Announce Flagship AIO Liquid Coolers
Cooling Systems

Noctua and Asetek Announce Flagship AIO Liquid Coolers

Toshiba Begins Sampling of 30-34 TB SMR Nearline Hard Disk Drives
Enterprise & IT

Toshiba Begins Sampling of 30-34 TB SMR Nearline Hard Disk Drives

ASUS ROG Strix Laptop Lineup Returns With the Latest Intel Core Ultra 9 290HX Plus Processors
Gaming

ASUS ROG Strix Laptop Lineup Returns With the Latest Intel Core Ultra 9 290HX Plus Processors

EnGenius Brings AI-Powered Analytics and Sophisticated Cloud Management to Existing ONVIF Cameras
Enterprise & IT

EnGenius Brings AI-Powered Analytics and Sophisticated Cloud Management to Existing ONVIF Cameras

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Arctic Liquid Freezer III 360 Pro Argb

Arctic Liquid Freezer III 360 Pro Argb

Soft2bet and the unseen hardware that makes instant play possible

Soft2bet and the unseen hardware that makes instant play possible

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed