Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Attackers exploit Apple DRM weakness to infect non-jailbroken iOS devices

Lucian Constantin | March 17, 2016
If a malicious app is published on the App Store once and then is removed, attackers can continue to infect devices with it through PC malware.

In this case, the attackers tricked users into installing the iTune-like software themselves, but in future attacks, they could do it through malware that silently infects computers through exploits.

"Our analysis of AceDeceiver leads us to believe FairPlay MITM [man-in-the-middle] attack will become another popular attack vector for non-jailbroken iOS devices -- and thus a threat to Apple device users worldwide," the Palo Alto researchers said in a blog post Wednesday.

This is the second time in a month when researchers found rogue apps on the App Store, proving that bypassing Apple's app review process is not only possible, but fairly easy. In both cases, the malicious apps masqueraded as harmless applications and only enabled their malicious functionality when run on devices with IP addresses from China.

 

Previous Page  1  2 

Sign up for CIO Asia eNewsletters.