Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
IOS Security Apple IT

US Gov't Issues Alert About iOS "Masque Attack" Threat 98

alphadogg writes Three days after security company FireEye warned of an iPhone/iPad threat dubbed "Masque Attack", the U.S. government has issued a warning of its own about this new risk by malicious third-party apps to Apple iOS devices. US-CERT warned: "This attack works by luring users to install an app from a source other than the iOS App Store or their organizations' provisioning system. In order for the attack to succeed, a user must install an untrusted app, such as one delivered through a phishing link." Revelations of Masque came on the heels of a related exploit (that also threatens Macs) called WireLurker.
This discussion has been archived. No new comments can be posted.

US Gov't Issues Alert About iOS "Masque Attack" Threat

Comments Filter:
  • I don't get it... (Score:5, Insightful)

    by XaXXon ( 202882 ) <xaxxon&gmail,com> on Thursday November 13, 2014 @06:50PM (#48382103) Homepage

    Don't you have to jump through all sorts of hoops to even INTENTIONALLY install an app from an alternate source?

    Seems like it would be hard to do it unintentionally.

    • by Russ1642 ( 1087959 ) on Thursday November 13, 2014 @07:03PM (#48382215)

      You can't stop viruses that are manually installed by ridiculously dumb users unless you have virus scanners, and even then it's hit and miss. I wouldn't even call it an exploit.

      • Re: (Score:2, Insightful)

        by NatasRevol ( 731260 )

        They have to be smart enough to jailbreak, point to an alternative app store, and install a corrupted app.

        Or be dumb enough to hand it to a smart friend who can do this.

        • actually, they can put the binaries on any webpage. that's how betas are distributed.
          it's as easy a clicking a link and saying "yes" twice.

          • Re:I don't get it... (Score:5, Informative)

            by tlambert ( 566799 ) on Thursday November 13, 2014 @08:12PM (#48382595)

            actually, they can put the binaries on any webpage. that's how betas are distributed.
            it's as easy a clicking a link and saying "yes" twice.

            No, you can't. They have to be one of:

            (A) signed by Apple (e.g. anything from the App store)
            (B) a developer signed binary running on a device enrolled under the developer's key as one of a limited number of devices
            (C) enterprise enrolled and signed with the enterprise key

            The exploit takes advantage of pirate App stores in china which require you to accept enterprise enrollment in their enterprise key, and then download binaries from their "App Store" after paying a reduced rate for them (they're pirated) that happen to have had malware installed into the app bundle prior to being signed by the enterprise key belonging to the store (and the store is not checking the apps it puts up for sale, because they are all purchased and then uploaded from jailbroken iPhones).

            So it takes a lot of work, and most of the people at risk from this are in China and basically stealing Apps.

            • Or you just need one malicious actor in charge of an enterprise deployment server. This is especially an issue if you have a BYOD policy and one bad apple that wants to steal peoples banking credentials. If I am used to installing apps from my corporation on my phone, anyone who has control of that deployment machine could potentially attack my device. That includes nefarious people who gain access to the deployment server over the internet.
        • by Bogtha ( 906264 )

          They have to be smart enough to jailbreak, point to an alternative app store, and install a corrupted app.

          No, this is unnecessary. The malicious applications are signed as an enterprise application, so no jailbreaking is necessary. They are distributed using Apple's standard OTA distribution mechanism designed for enterprise applications and beta testing, so no alternative App Store is necessary.

          What happens is that the user goes to a malicious/compromised website, this redirects them to the applica

      • by mjwx ( 966435 )

        You can't stop viruses that are manually installed by ridiculously dumb users unless you have virus scanners, and even then it's hit and miss. I wouldn't even call it an exploit.

        B-B-B-B-But Apple said I was protected and viruses dont happen to them.

        • B-B-B-B-But Apple said I was protected and viruses dont happen to them.

          Find me one instance where Apple said that.

          [Crickets]

    • Yeah my understanding was that you had to jailbreak your iphone first with Cydia or some such tool before you can buy apps from someplace other than Apple.

      • by XaXXon ( 202882 )

        cydia isn't a jailbreak tool - it's an alternate app store.

        Pangu is a jailbreak tool.

      • by ruir ( 2709173 )
        Yes, you can for sure install untrusted apps on iOS without hacking. I can remember from the top of my head at least three ways. Phones in dev mode (not the problem here), Enterprise certs and beta software distributed through TestFlight.
        • Yes, you can for sure install untrusted apps on iOS without hacking. I can remember from the top of my head at least three ways. Phones in dev mode (not the problem here), Enterprise certs and beta software distributed through TestFlight.

          I believe that the limit on TestFlight is 100 phones, and those have to be added to a "List".

          Enterprise Certs are easily determinable and Revokable by Apple.

          The system is just about as secure as could reasonably be designed.

        • All the modes you mention count as hacking, as an ordinary user can not do that.
          Perhaps you forgot are not even aware what 'hacking' actually means.

          • by ruir ( 2709173 )
            I am well aware what hacking means, what craking means, and what developers are, since I am one. I am also aware you are an idiot with true much free time on your hands. I only have doubts wether my time is well applied replying to you, which clearly is not.
            • If you are aware of the differences how can you claim a mere user does not need to 'hack' to get random software on an iOS device?

  • false flag? (Score:4, Interesting)

    by Noah Haders ( 3621429 ) on Thursday November 13, 2014 @07:10PM (#48382247)

    since when does the govt issue virus alerts? My best guess is that NSA is alarmed by uncrackable iphone encryption, so they're doing everything they can to scare people off their iphones and on to something more easy to control like droid or bby

  • by piranha32 ( 1094673 ) on Thursday November 13, 2014 @07:16PM (#48382277)

    Hi,
        This is an Albanian virus. As you know we are not so technical
        advanced as in the West. We therefore ask you to delete all your
        files on your harddisk manually and send this email to all your
        friends.

        Thanks for helping us,
        The Albanian Hackers

    When I saw it many years ago it looked like a good joke

    • There is a bug in the e-mail. It should be 'We therefore ask you to send this email to all your friends and then delete all your files on your harddisk manually'.

      You still need some of those files on your harddisk in order to send an e-mail. Friends with less than average intelligence might not realize that.

  • security of a smartphone is not better than that of a PC. What a news.
  • ...but it's written for iOS 7 and above. Won't run on my 3Gs.

    I feel so left out!

  • "In order for the attack to succeed, a user must install an untrusted app, such as one delivered through a phishing link."

    What is the point about this 'security alert'. If anyone installs an app from some malicious third-party site then of course they are going to get exploited. This is nothing more than social engineering, nothing to see here, moving on. What is this even doing as an article on slashdot?

"Experience has proved that some people indeed know everything." -- Russell Baker

Working...