Researchers Snuck Malware Into Apple's App Store. Find Out How
Aug 18, 2013 23:34
There isn't any documented process of how Apple allows apps to wind up in the App Store. The only thing we know is that they're more stringent compared to Android. Still, nothing is completely safe.
A bunch of researchers managed to sneak malware onto the App Store by giving their app the power to transform. Say what?
Dubbed Jekyll, it was able to send e-mails and texts, steal information and device ID numbers and take photos, send tweets and attack other apps. The only thing is, it couldn't do it from the get go.
The malicious code, was instead, broken into innocent looking segments that would transform after download. Here's how a researcher described it:
The app did a phone-home when it was installed, asking for commands. This gave us the ability to generate new behavior of the logic of that app which was nonexistent when it was installed.
The research team slipped Jekyll into the App Store and downloaded it and ran the attacks on themselves before deleting it off the store. They were able to tell that Apple only scanned it for mere seconds. Perhaps scanning longer would have helped?
The team showed off their results last Friday at a the Usenix conference but all that happened in March. Apple has since tweaked its app review process, and is obvious they're not talking about this either.
There's nothing that's truly safe to download out there. In any app store. Just take some precaution. It never hurts.
Electronic Logging Devices (ELDs) have revolutionized the trucking industry by streamlining logging practices and ensuring compliance with federal regulations. Designed to monitor a vehicle’s engine and automatically record driving hours, ELDs replace traditional paper logs and provide an efficient solution for tracking Hours of Service (HOS). If you're looking to complement your fleet's technology, partnering with tools like a reliable truck dispatch service can further optimize operations and keep your business running smoothly. Read more
The HONOR Magic 7 Pro price in ksa makes it an appealing option for those looking for a high-end smartphone. This advanced device stands out with its sleek design and robust build quality. This blog delves into the details, examining what makes the HONOR Magic 7 Pro unique, from the materials used to its overall durability and user experience. If you’re considering purchasing a high-end smartphone that balances aesthetics and functionality, this review of the HONOR Magic 7 Pro’s design and build quality will provide you with all the information you need. Read more
Organizations continue to reside under substantial pressure to provide security and compliance with data in the current-day complex regulatory ambiance. Enter endpoint management — a strategic approach to managing and securing devices, that has become a key tool for achieving these objectives. Endpoint management solutions assist organizations with stringent compliance requirements by establishing a single interface for monitoring, controlling, and securing devices. Read more