Menu
Apple blocks infected WireLurker apps from running

Apple blocks infected WireLurker apps from running

The company advised that people stick to trusted sources for downloading apps

Apple has acted quickly to address a malware threat to iOS and Mac OSX computers, saying Thursday it has blocked apps from running that are infected with the WireLurker malicious code.

A day earlier, security vendor Palo Alto Networks revealed a campaign in which hackers were transferring malware to Apple devices through infected desktop applications downloaded from a Chinese marketplace.

The attack was a novel one in that it compromised iOS devices that had not been jailbroken, or altered to remove the restrictions that prevent people from downloading apps outside of the thoroughly-vetted App store.

About 467 Mac desktop applications were found to be infected with WireLurker at an app store for Chinese users called Maiyadi. The malware waits until an iOS device is connected to the desktop via USB, then uses one of a two methods to infect the mobile device. WireLurker can then steal data from the device, such as phone logs.

Apple didn't say exactly what steps it has taken to stop the attack, but said "we are aware of malicious software available from a download site aimed at users in China, and weve blocked the identified apps to prevent them from launching."

The company reiterated its longstanding advice to download software only from trusted sources.

Dave Jevans, founder and CTO for mobile security company Marble Security, said Apple had a few different options for thwarting WireLurker.

One way it infects devices is by using an enterprise provisioning certificate, which is used by developers building apps for in-house that don't appear on the App Store. The certificates are what allows those apps to run on iOS, and in the hands of a malicious hacker could be used to spread infected applications. Apple revoked the certificate used by WireLurker's creators, Jevans said.

That would help protect phones that aren't jailbroken from running infected apps, but it might not help those whose devices have already been infected, he said.

Apple could also update Safari to prevent people from navigating to the Maiyadi website, but users would still be able to get there using Chrome or other browsers. The company could also update its XProtect antivirus engine with a signature to block WireLurker installations, Jevans said.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags ApplesecuritymalwareMarble Security

Featured

Slideshows

Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Show Comments