Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
IOS China Security Apple

iOS Trojan Targets Hong Kong Protestors 72

First time accepted submitter Kexel writes Security researchers have claimed to discover the first Apple iOS Trojan attack in a move to thwart the communications of pro-democracy Hong Kong activists. From the article: "The malicious software, known as Xsser, is capable of stealing text messages, photos, call logs, passwords and other data from Apple mobile devices, researchers with Lacoon Mobile Security said on Tuesday. They uncovered the spyware while investigating similar malware for Google Inc's Android operating system last week that also targeted Hong Kong protesters. Anonymous attackers spread the Android spyware via WhatsApp, sending malicious links to download the program, according to Lacoon. It is unclear how iOS devices get infected with Xsser, which is not disguised as an app."
This discussion has been archived. No new comments can be posted.

iOS Trojan Targets Hong Kong Protestors

Comments Filter:
  • 1. You grab your protestor-beating-nightstick.
    2. You walk down to the phone distributor's HQ
    3. You say: "You know that software update system you built for your phones? Let us borrow it for a while"
    4. If you run into any problems, gesture vaguely at the nightstick from step 1.

    Problem solved.

  • by mTor ( 18585 ) on Wednesday October 01, 2014 @01:38PM (#48039717)

    Here's the actual analysis of malware:

    https://www.lacoon.com/lacoon-... [lacoon.com]

    The iOS device needs to be jailbroken in order to be infected. Then with Cydia installed, the repository would be need to be added and then the package could be installed. All thatâ(TM)s known is that both the iOS and Android attacks share a CnC server.

    • by Noah Haders ( 3621429 ) on Wednesday October 01, 2014 @01:40PM (#48039741)
      +1000 relevant. when any iOS malware is reported, the first question is, "does it require jailbreaking". To my knowledge all of the trojan/spyware/NSAware/etc require a jailbroken iphone.
      • by Noah Haders ( 3621429 ) on Wednesday October 01, 2014 @01:46PM (#48039825)
        oh by the way, the exploit to jailbreak ios7 was developed by a previously-unknown Chinese haX0r group. Just putting that out there.
      • by robmv ( 855035 )

        Until someone use one of those remote vulnerabilities that were used previously to jailbreak phones for malware (I remember one that did the jailbreak with just visiting a web page). We are talking about China here, so if this is some kind of government sponsored attack, they probably already have unreported security bugs at their disposal. It is true that iPhone security has being enhanced with every release, but at the same time code size has increased, so It must be something in ther to do more damage w

        • I think that one was a vulnerability in iOS 4.1. Since then there have been a variety of tethered and untethered jailbreaks. All have required directly interacting with the physical device, and all these holes have been plugged up quickly once the vulnerability is released.
      • by Rich0 ( 548339 )

        +1000 relevant. when any iOS malware is reported, the first question is, "does it require jailbreaking". To my knowledge all of the trojan/spyware/NSAware/etc require a jailbroken iphone.

        That's great, but seriously, who doesn't jailbreak their iphone? The security of the walled garden is fairly theoretical since there is so much incentive to disable it.

        It is a bit like saying that some website can't steal your personal info unless you click through that warning that shows up the first time you use Firefox on a webpage with a non-SSL form.

        • by Wrath0fb0b ( 302444 ) on Wednesday October 01, 2014 @02:48PM (#48040673)

          Perhaps stories like this will make clear what the costs of disabling code signing really are, to be weighed against the incentive to disable it ...

        • I'm considering jailbreaking my iPhone to be able to run git. Otherwise... I just haven't had the need.

          Android's a different story. You need to root your phone so that you can firewall your flashlight app.

          • by Rennt ( 582550 )
            Wouldn't it be simpler to just pick a flashlight app that doesn't ask for access to gps and network access?
        • by Noah Haders ( 3621429 ) on Wednesday October 01, 2014 @03:11PM (#48040971)
          well, considering that over 50% of all iOS devices are running iOS 8, and no jailbreak exists for this OS, i think there are a lot of people who hasnt jailbroken their phones. anecdotally, I don't know anybody that has done this. oh wait I know one guy but he was a bit of a wanker.
        • by tlhIngan ( 30335 )

          That's great, but seriously, who doesn't jailbreak their iphone? The security of the walled garden is fairly theoretical since there is so much incentive to disable it.

          It is a bit like saying that some website can't steal your personal info unless you click through that warning that shows up the first time you use Firefox on a webpage with a non-SSL form.

          Generally the number of jailbroken iOS devices has hovered around 10%.

          Not too many people do jailbreak because iOS is pretty much good enough, and each rev

        • You ignored the second part of the requirement: The malware requires a jailbroken phone AND THEN it requires you to _install the malware_.

          In other news, if you disable your computer's anti-virus software and install a virus you will...have a virus. Shocking, I know.
      • by AmiMoJo ( 196126 ) *

        GCHQ claims to be able to access any iPhone, jailbroken or not. It stands to reason that it is possible, since clearly the jailbreak exploit itself is cable of exploiting a non-jailbroken phone. Other malware could discover and use the same weaknesses.

        Remember when you could jailbreak just by visiting a website?

        • yes that was for ipad2 and iphone4. the diff between apple and goog is that less than 10% of ios devices are using anything before ios7, and less than 2% using anything before ios6. meanwhile, the vast majority of goog users are stuck on old OS before 4.0 cuz they're no longer supported.
    • sudo apt-get install malware

      Easy-peasy.
    • Beware that many jailbreakers also install SSH on their devices. SSH comes with a default password "alpine" for the two users present on an iOS device (root and mobile). Both of them obviously need to be changed.

      If a jailbreaker forgets to change both default passwords SSH access is wide open and malware can easily be installed from outside.

  • by Ronin Developer ( 67677 ) on Wednesday October 01, 2014 @01:42PM (#48039761)

    The Android attack vector is pretty clear. Oddly, they don't know how it spreads to iOS devices. If it's not spread as an malicious, sandboxed app, then how does it get on an iPhone?

    How about:
    a) Phone was jailbroken.
    b) Phone had a modified iOS installed.
    c) Some vulnerability exists in one of the built in apps that allows malicious software to be installed outside of the confines of the sandbox.

    Given it's happening in China during the protests and with a large iOS device blackmarket, I'm betting on (b) followed by (a) with a very slight chance of (c) and that this malware won't be seen in the rest of world anytime soon.

    • Jailbroken iOS, is the vector and requirement.
      • Yes, read the analysis offered in another poster's comments.

        So, the question begging to be asked is whether jailbreaking phones in China by the owner is a common occurrence or if the phones are sold "pre-jailbroken" by a larger agency and able to download and install these hacks at will?

        • So, the question begging to be asked is whether jailbreaking phones in China by the owner is a common occurrence or if the phones are sold "pre-jailbroken" by a larger agency and able to download and install these hacks at will?

          ooh, that's a good question! are all iphones jailbroken by the time they hit the apple store? If you install a new OS version, will that overwrite the covert jailbreaking or is the jailbreaking embedded so deep that you can't get around it? I don't know the answers to these questions.

        • by tlhIngan ( 30335 ) <slashdot&worf,net> on Wednesday October 01, 2014 @02:20PM (#48040251)

          So, the question begging to be asked is whether jailbreaking phones in China by the owner is a common occurrence or if the phones are sold "pre-jailbroken" by a larger agency and able to download and install these hacks at will?

          Probably a mix of both, because the #1 reason to jailbreak these days seems to be... pirating software. I mean, the iOS 7.12 jailbreak was done by a bunch of Chinese people to promote... their Chinese app store. Which happens to conveniently be filled with pirated apps. (It was one of the things that led to the original iOS7 exploit to be questioned).

          So effectively the users jailbreak to get "free apps" from the Chinese app store that also happens to install malware along with it.

          I'm guessing the Chinese store must have a lot of pirated apps, because piracy on iOS is just at a lower level - at least on Android there are entire "daily packs" that contain new and freshly updated paid apps on your favorite torrent site (which can be RSS fed to your torrent client). iOS apps ... not so much. Maybe a fraction and not as convenient to get.

        • I just want to thank you for not using "begs the question" incorrectly here.
        • Phones are sold with the latest OS version. Jailbreaks take months to come out for a particular OS version, if they come out at all.

          For example there is no iOS 8 jailbreak. So no iPhone 6 or any iOS device running iOS 8 is jailbroken.

          I can believe that a good proportion of pre-owned phones come with a jailbreak. But not new phones, even if they are grey market or intercepted by corrupt governments.

  • by rabtech ( 223758 ) on Wednesday October 01, 2014 @01:49PM (#48039859) Homepage

    Is this a story about iOS malware? Then you should require the answer to this question:

    1. DOES IT REQUIRE JAILBREAK?

    The only *interesting* iOS malware story is one that does not require jailbreak. I'm not aware of any; there may be some that use known or unknown exploits, but in this case the malware requires the user to have a jailbroken phone. That's not news or "stuff that matters".

    Sincerely,
    Slashdot Readers

    • by blueg3 ( 192743 )

      It doesn't just require a jailbreak. It also requires the user to install the software.

  • by baudilus ( 665036 ) on Wednesday October 01, 2014 @01:51PM (#48039883)
    Sounds to me like that had this ready to go, even before the protests. I'd imagine that the percentage of jailbroken iOS devices in China markedly outstrips those in the western world, given the political climate and sandboxed internet there. It seems that the government was both aware of the devices and had the gun cocked and ready to fire.
    • I imagine most first world governments have a cyber division by now, who are quietly searching for exploits, and when one is found it's put into a database for future use, and not reported to whoever made the software. I'll but when shellshock was discovered by external security researchers there was a collective "Aaah Damn It!" from the NSA.
  • by www.sorehands.com ( 142825 ) on Wednesday October 01, 2014 @02:23PM (#48040285) Homepage

    IOS 8.0.1 will disrupt cellular communications on an iPhone without the need to root the phone.

    It's not a bug, it is a feature.

  • Apple designs them this way, so that nation states can access therm, they get favored status for this.

    The otherr option for you fanbois is that Apple is simply incompetent.

  • xsser (Score:4, Informative)

    by koan ( 80826 ) on Wednesday October 01, 2014 @02:35PM (#48040495)

    https://www.lacoon.com/lacoon-... [lacoon.com]

    "Cross-Platform attacks that target both iOS and Android devices are rare, and indicate that this may be conducted by a very large organization or nation state. The fact that this attack is being used against protesters and is being executed by Chinese-speaking attackers suggests it’s first iOS trojan linked to Chinese government cyber activity."

  • 'Security researchers have claimed to discover the first Apple iOS Trojan attack .. It is unclear how iOS devices get infected with Xsser, which is not disguised as an app."'

You know you've landed gear-up when it takes full power to taxi.

Working...