iOS Developer Site At Core of Facebook, Apple Watering Hole Attack 88
msm1267 writes "The missing link connecting the attacks against Apple, Facebook and possibly Twitter is a popular iOS mobile developers' forum called iphonedevsdk which was discovered hosting malware in an apparent watering hole attack that has likely snared victims at hundreds of organizations beyond the big three. It's not clear whether the site remains infected, but researcher Eric Romang dug into the situation and determined that the site was hosting malicious JavaScript that was redirecting visitors to another site, min.liveanalytics. That site had been hosting malware as of Jan. 15."
Obligatory (Score:4, Funny)
Re:Obligatory (Score:4, Funny)
Smoking bong hits, laughing hysterically, and trying to figure out how else to fuck with us. ;-)
Re: (Score:2, Funny)
Don't think of it as an asteroid impact, think of it as a polite inquiry into the progress of your space program.
Re: (Score:2)
Where's your God now?
he died in october 2011... duh!
what rock have you been living under?
Re: Obligatory (Score:2)
Jimmy Savile!?
Re: (Score:1)
That was deeply hurtful and insulting. Why do you hate Tinker Toys so much?
Re:LOL (Score:5, Funny)
Since the exploit was in Oracle Java I would blame Java, not the operating system which dutifully let the program run. What do you suggest that Apple should do to tidy up the security in OS X? Make it run only Apple approved binaries?
Re: (Score:3)
Not for the last two years. They passed it back to Oracle after Oracle bought Sun.
Re:LOL (Score:5, Informative)
Not exactly.
They stopped supporting future versions of Java - namely, Java 7. They still support Java 6.
In theory, by now, Java 6 support should have been dropped and Java 6 should no longer be updated at all. However, due to problems with Java 7, and compatibility issues between Apple Java and Oracle Java on Mac OS X, Java 6 lives on and is still being updated.
The Apple update to Java 6 was delivered through Software Update by Apple as an OS update. Java 6 is still done by Apple. At some point, Apple will drop support for Java entirely and the only way to run Java on Mac OS X will be to install it from Oracle.
In fact, this should have happened already. But it hasn't, yet. The next version of Mac OS X will presumably drop support for Apple's Java entirely, but as of today, it still lives on, and patches for it still come from Apple.
Re: (Score:2)
Yet the security hole in question was related to Oracle Java, not Apple Java.
Re: (Score:1)
wow. talk about idiot moderators. Pointing out that OP was talking about *OLD* status and not what is current is now a worth modding down eh?
Re:LOL (Score:4, Insightful)
Of course this does not apply to Windows where hacks via flash, java, quicktime, etc are definitely the fault of the Windows OS, probably Bill Gates in particular, as he's the devil. That's always been the consensus on slashdot.
Re:LOL (Score:4, Insightful)
Since the exploit was in Oracle Java I would blame Java, not the operating system which dutifully let the program run.
Well that counts out just about every Windows exploit from being Microsoft's fault then, after all Windows was just dutifully letting the program run. Do you know nothing about security? If you can exploit a user level application to compromise the system then it is the system's fault.
Re: (Score:2)
Since the exploit was in Oracle Java I would blame Java, not the operating system which dutifully let the program run.
Well that counts out just about every Windows exploit from being Microsoft's fault then, after all Windows was just dutifully letting the program run. Do you know nothing about security? If you can exploit a user level application to compromise the system then it is the system's fault.
Not quite - it all depends where the vulnerable code is. If it's in java.dll, the fault is Oracle's. If it's in, say, user32.dll, then the fault can definitely be blamed on Microsoft.
Mac Users Do a Software Update (Score:5, Informative)
The fix to patch the vulnerability and remove the malware if it's there is available today. Mac users should do a software update.
Re: (Score:2, Insightful)
Any user with Java on their system, regardless of OS, should do an update (or disable Java...).
Re: (Score:1)
Re: (Score:1)
So a company identifies a flaw and puts out a fix and your solution is...to abandon ship and find another manufacturer? You'll run out of viable solutions very quickly, fellow Anonymous Coward.
Re: (Score:2)
So a company identifies a flaw and puts out a fix and your solution is...to abandon ship and find another manufacturer? You'll run out of viable solutions very quickly, fellow Anonymous Coward.
Obligatory car analogy - it's like buying a Chevy because your Ford's got a flat tyre.
Re:Mac Users Do a Software Update (Score:5, Informative)
The fix to patch the vulnerability and remove the malware if it's there is available today.
The keyword there is "today." The actual Java patch was available earlier, it's just Apple only bothered patching their version of Java until - well, after they got bitten by the vulnerability, apparently. Apple had been content to just say "applets are no longer supported" and leave it at that.
Re: (Score:2)
http://support.apple.com/kb/HT5573
This update uninstalls the Apple-provided Java applet plug-in from all web browsers. To use applets on a webpage, click on the region labeled "Missing plug-in" to go download the latest version of the Java applet plug-in from Oracle.
You do realize that Apple has handed over Java support on OSX back to Oracle, right?
Re: (Score:2)
You do realize that Apple has handed over Java support on OSX back to Oracle, right?
For Java 7, yes, Apple doesn't support that. For Java 6, they still do. The Apple version of Java still exists, was vulnerable to the Java 0-day, and missed the patches that fixed it that were first released a couple of weeks ago. Their fix was instead to just disable applets entirely, which is great unless your IT department requires an applet to use their wi-fi network. (Seriously.)
And, yes, there are still some Mac OS X apps that require Apple's version of Java, because it's not completely compatible wit
Re: (Score:2)
You do realize that Apple has handed over Java support on OSX back to Oracle, right?
For Java 7, yes, Apple doesn't support that. For Java 6, they still do. The Apple version of Java still exists, was vulnerable to the Java 0-day, and missed the patches that fixed it that were first released a couple of weeks ago.
Now that's odd, are you claiming that the 0-day works in Apple's Java 6 despite only working under Java 7? http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0431 [nist.gov]
Re: (Score:2)
The fix to patch the vulnerability and remove the malware if it's there is available today.
The keyword there is "today." The actual Java patch was available earlier, it's just Apple only bothered patching their version of Java until - well, after they got bitten by the vulnerability, apparently. Apple had been content to just say "applets are no longer supported" and leave it at that.
RTFA. Seriously. There was a patch - but it didn't fully fix the hole. Not to mention that "Apple's version of Java" wasn't affected, only Java 7.
Most comments below... (Score:3, Insightful)
Re: (Score:2)
A lot of comments above are already full of hate :/ And I don't get why they blame Apple for this when clearly Oracle is at fault for letting Java stagnate this much.
When Cisco took over Linksys we ended up with lackluster hardware. No big deal. But when Oracle let their bought product stagnate, the damage is a lot more severe if only due to its sheer ubiquity and dependence.
Re: (Score:2)
I don't get why they blame Apple for this when clearly Oracle is at fault for letting Java stagnate this much.
The reason is because this flaw exists in Apple's implementation of Java 6 - which is still required by many people as not all apps work on Oracle's Java 7 (which was patched for this vulnerability some time ago).
Re: (Score:2)
I don't get why they blame Apple for this when clearly Oracle is at fault for letting Java stagnate this much.
The reason is because this flaw exists in Apple's implementation of Java 6 - which is still required by many people as not all apps work on Oracle's Java 7 (which was patched for this vulnerability some time ago).
Funny - there's no mention of Java 6 here [nist.gov], only Java 7.
Re: (Score:2)
Funny - there's no mention of Java 6 here [nist.gov], only Java 7.
Why are you only looking at one vulnerability?
As reported by Ars Technica, the 15th February, Facebook was victim of a watering hole attack, involving a “popular mobile developer Web forum“. The attack was using a Java 0day that has been urgently patched, in Oracle Java CPU of first February, by version 7 update 11 and version 6 update 39. http://eromang.zataz.com/2013/02/20/facebook-apple-twitter-watering-hole-attack-additional-informations/ [zataz.com]
Re: (Score:2)
Re: (Score:2)
It's the only vuln linked to as far as I can see.
The article just mentions that there was an exploit added to the Cool Exploit Kit that exploits that specific vulnerability, it doesn't make any suggestion that was the one used or that the Cool Exploit Kit was used, it could have been any of the many 0-day exploits patched very recently.
malware (Score:5, Interesting)
Re: (Score:1)
It used to be a great site for App Store marketing tips, but since has gone downhill some what
Okay.... this is a new one. (Score:3)
What the heck is a "watering hole attack"?
Re: (Score:2, Troll)
People come to you.
Animals need to go to a watering hole to get their water, iOS folks need to go to this site to get their software.
Re: (Score:1)
Quote : "iOS folks need to go to this site to get their software."
Ehhhhh....no.
Re: (Score:1)
People come to you.
Animals need to go to a watering hole to get their water, iOS folks need to go to this site to get their software.
Not really. It's more of a 'candy store' attack. It's a popular, but not necessary. site.
Re: (Score:2)
The only place iOS folks really need to go for their software is to Apple's online developer portal.
I've been developing for iOS for 2 years now, and had not ever heard of this particular web forum prior to this article.
Re: (Score:1)
Come now, stop feeding the trolls.
Re: (Score:2)
Really? Were developing with a rule against using a search engine? They turn up in plenty of my search results for various iOS dev related things.
They were one of 'the first' iOS dev sites, earlier enough that I'd venture to say they were probably there before apple's iOS SDK existed but my memory may be a bit off, that was 5 years ago.
Not knowing about this site indicates you live in a virtual box.
Re: (Score:2)
It may not be entirely accurate, but what retarded mods are flagging this Troll?
Re:Okay.... this is a new one. (Score:5, Informative)
Re:Okay.... this is a new one. (Score:5, Funny)
What the heck is a "watering hole attack"?
It's where troopers metaphorically attack a swagman by a billabong (the 'watering hole') causing him to leap to his death and subsequently haunt the area. I won't go into detail on how this applies in relation to computer security, but I'm sure you get the gist of it.
Re: (Score:2)
best reply of 2013 so far.
Re:Okay.... this is a new one. (Score:5, Informative)
Re: (Score:1)
What the heck is a "watering hole attack"?
I'm not quite sure, I was half expecting a Hurd of GNUs in a drinking frenzy.
Re:without clicking on the link (Score:5, Funny)
Time to learn. (Score:2)
Re: (Score:2)
a trusted platform like Java
Sorry, what? Several things come to mind when I think about Java, "trusted" is not one of those things. Java is a textbook example of a single piece of the platform (the browser plugins) giving the entire thing a bad name, even if it's not justified. Anyone who still browses around the general internet with a browser that has the Java plugins enabled is either unaware of what the Java plugin is, or stupid. If you're a Java developer, have one browser with your plugins enabled that you use only to develo
Re: (Score:1)
I have a completely secure computer for you, it's called a rock.
Yes, running a no-script browser is techincally safer, but it's also technically useless as you're missing out on the content provided by those scripted services. Do you manually type in captcha hashes? Do you ignore all video posted anywhere? You'll never run a single script, ever? A browser is inherently insecure as it's entire purpose is to download and render remote scripts.
It's very ignorant to insist that you're bullet-proof, or to in
Re: (Score:2)
Yes, running a no-script browser is techincally safer, but it's also technically useless as you're missing out on the content provided by those scripted services. Do you manually type in captcha hashes? Do you ignore all video posted anywhere? You'll never run a single script, ever?
Where did you get that from? The interface of the major application I work on is over 1.5MB of Javascript. I don't disable Javascript. I disable plugins from automatically starting plugin content. This has nothing to do with scripting. I'm talking about Java, not Javascript. Hopefully you know the difference, if you don't then don't bother to reply to things like this. As for video specifically, if I come across a Flash video on a news site or whatever that they embedded in a way where click-to-start
that makes sense (Score:1)
Those darn Chinese! (Score:2)
Ah, the weakly supported claims that China is at an all-out "cyberwar" now become clearer. The Chinese army must have created the site min.liveanalytics.org. Then they deviously drew in visitors from a popular site, including some from major US corporations. For any machine that was vulnerable, China has thusly "hacked" the corporations owning those machines. Hackers get cred, the news media gets to scream that the sky is falling, and the US government gets to increase funding for the "war on cyberterror".
There's an update (Score:2)
There's an update to the first article - looks like almost the same attack (via the same JavaScript inclusion, using a different exploit of course) was active on Fedoraforum.org last July.