BY Variety News PH
12:14 AM
0
Malware campaign on iOS devices
Image source: Google |
A malware campaign has been found targeting iOS devices linked to a wide range of entities, including European defense organizations, governments, and media sectors with dangerous espionage spyware capable of breaching non-jailbroken devices, a recent report claims.
The spyware campaign, dubbed "Operation Pawn Storm" by security experts, was first detected on Windows computers late last year, but has now made its way to iOS devices, a report by security researchers at TrendLabs noted. The researchers linked the campaign to the Russian government.
XAGENT SPYWARE APP
The spyware campaign, dubbed "Operation Pawn Storm" by security experts, was first detected on Windows computers late last year, but has now made its way to iOS devices, a report by security researchers at TrendLabs noted. The researchers linked the campaign to the Russian government.
XAGENT SPYWARE APP
One of the two spywares used in the campaign is actually an application, the firm dubbed the app XAgent, that attempts to install and run on iOS devices.
"The XAgent app is fully functional malware," the researchers noted. "The exact methods of installing these malware is unknown; however, we do know that the iOS device doesn't have to be jailbroken ... We have seen one instance wherein a lure involving XAgent simply says 'Tap Here to Install the Application'."
The fake website then distributes the spyware via Apple's ad-hoc provisioning feature intended for enterprises and developers who wish to distribute their apps to a small group of individuals and allows users to bypass the App Store.
XAGENT COLLECTS ALMOST EVERYTHING
The fake website then distributes the spyware via Apple's ad-hoc provisioning feature intended for enterprises and developers who wish to distribute their apps to a small group of individuals and allows users to bypass the App Store.
XAGENT COLLECTS ALMOST EVERYTHING
Once installed, XAgent will collect text messages, contact lists, pictures, geolocation data, information from a list of installed apps on an iOS device, and the WiFi status of the device. The information is then sent back to a server operated by the hackers. XAgent is also capable of switching on the phone’s microphone and recording everything it hears.
The XAgent malware application runs on both iOS 7 and iOS 8 devices, whether they’ve been jailbroken or not. The malicious app is most dangerous on iOS 7 since it hides its icon to evade detection, but it is unable to hide itself or automatically restart itself on iOS 8 devices.
MADCAP GAME APP
Another malware agent of Operation Pawn Storm is a malware that disguised as a game called "MadCap". It focused on recording audio and only works on jailbroken devices. MadCap functionality is similar to XAgent, but differs in that it can only be installed on jailbroken devices.
Security researchers said that the malware applications appeared to be carefully maintained and consistently updated by the hackers. The attackers' have not been identified yet, although the command and control server used in the attacks was in operation at the time of research.
Source: The Hacker News
Subscribe to:
Post Comments (Atom)
Popular Posts
Advertisement
Blog Archive
-
▼
2015
(87)
-
▼
February
(65)
- Cherry Mobile Flare S3 Problems: Temporary and Per...
- Watch: Vice Ganda Kalokalike Daniel Aliermo
- Jam Sebastian of Jamich on Life Support
- Full texts plus LIVESTREAM: President Aquino's Spe...
- Understanding PNP-SAF's Chain of Command
- Bill filed to prevent minors 'addiction' to DOTA, ...
- Poor pinay domestic helper in Saudi seeks help fro...
- Why millions of Filipinos still believe in PNoy
- Bangsamoro (BBL) A sell-out to Malaysia?
- Aquino Resignation is a black propaganda from poli...
- Cherry Mobile Flare S3, An Honest Review
- Duterte willing to run for President this 2016 Ele...
- Viral video uploader surfaces, now what?
- Sad truth: My insight on Filipino Ash Wednesday
- Filipino Catholics on Ash Wednesday and Tagle call...
- NapeƱas is a failure, says Miriam
- Miriam made Purisima look like a puppy
- Why BBL should be dismissed
- Iqbal questions the viral video's authenticity
- How to treat Bronchitis the natural way
- Do What You Love, Because Society Is A Trap And Wo...
- Woman Falls To Her Death After Being Proposed To O...
- Palestinian chased by Israeli soliders went viral
- Watch: Sheep thinks she's a dog
- Watch: A student commited suicide in Makati
- Marwan's dying declaration sent on e-mail
- Watch: Janet Napoles Kalokalike on Showtime
- Watch: FPJ Kalokalike on Showtime
- Picture of a young Muslim boy against all out war
- Watch: A video that will change your thoughts on M...
- Watch: Dying father walks daughter down the aisle
- Muslims took of their shoes for peace
- Watch: Liam Nesson on Clash of Clans
- The Side effect if Binay becomes president
- GarenaPH's LGBT ruling issue resolved
- Purisima resigned with a breaking statement
- Caught on Cam: Actual plane crash in Taiwan caught...
- Watch: Girl denies involvement in the 'Bagito' Sca...
- 10 Signs you've found your calling
- What Acne tells about your health
- Must Read: Native American Code of Ethics
- Watch Live: Aquino's second address to the Filipinos
- Watch Medusa, the Two-headed snake
- Are the Filipinos ready for Binay?
- Back with the old ways?
- On the Pope's Rabbit statement
- PNP-SAF are just pawns
- Oh My G is A false Propaganda
- Americans try Jollibee for the first time
- Malware campaign on iOS devices
- A teenager in China cut his hand off to cure his '...
- Cardinal Tagle’s e-mail hacked
- Marwan's Bounty could go to 2 MILF members
- Ninoy + People Power Conspiracy
- AQUINO COJUANGCO Conspiracy
- Blame game of the Filipinos
- Politicians taking advantage of Mamasapano incident
- Is Marwan dead? No, we can't be sure!
- 10 weird medical conditions that will shock you
- A 200-year-old Buddhist monk found
- PH celebs say NO TO PREMARITAL SEX
- A brief documentary of DotA 2
- Playing Video Games is not a crime
- Rave breaks into main event, DAC 2015
- The boy in 'Bagito' Scandal Suicide rumor, answered!
-
▼
February
(65)
No comments:
Post a Comment