Vulnerabilities / Threats
4/26/2010
01:34 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Apple iPad Used As Scam Bait

Cybercriminals are sending out malicious e-mail that targets iPad users, a sure sign that the device has been selling well.

Apple's continuing success as a company is encouraging more cybercriminals to try to exploit the popularity of the company's products to distribute malware.

The latest such scam involves spam e-mail messages addressed to iPad users. The messages direct recipients -- who may or may not be iPad users -- to click on a Web link that appears to host an iTunes update and to install the update.

The text isn't so poorly written as to be farcical. Even so, the use of the passive voice in the first sentence and the awkward wording suggests that the note's author doesn't work as a marketing professional at Apple or anywhere else.

"There were released updates for software installed on your iPad device," the message begins. "It is very important to keep the software on your iPad updated for best performance, newer features and security."

Recipients who happen to open this message on a Windows PC and comply with "update" instructions do not actually receive an update.

"Unfortunately for these users, following the malicious link means opening up a direct line to their sensitive data as instead of the promised iTunes update they get malware on their systems," said Sabina Datcu, security researcher for BitDefender, in a blog post.

BidDefender identifies the malicious code as Backdoor.Bifrose.AADY, which attempts to infect Internet Explorer to open a back door in the victim's system. It's designed to scour infected systems for software serial numbers and to capture login and password information.

Mac users, not to mention those reading their e-mail on their iPads, don't have to worry about this particularly malware.

In reporting its fiscal second quarter results last week, Apple did not disclose the number of iPads it had sold, but company executives said they were happy with iPad sales.

Apple previously said it had sold 300,000 iPads on April 3, the day it began selling the devices and delivering them to customers who had pre-ordered.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8921
Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

CVE-2014-9676
Published: 2015-02-27
The seg_write_packet function in libavformat/segment.c in ffmpeg 2.1.4 and earlier does not free the correct memory location, which allows remote attackers to cause a denial of service ("invalid memory handler") and possibly execute arbitrary code via a crafted video that triggers a use after free.

CVE-2014-9682
Published: 2015-02-27
The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.

CVE-2015-0655
Published: 2015-02-27
Cross-site scripting (XSS) vulnerability in Unified Web Interaction Manager in Cisco Unified Web and E-Mail Interaction Manager allows remote attackers to inject arbitrary web script or HTML via vectors related to a POST request, aka Bug ID CSCus74184.

CVE-2015-0884
Published: 2015-02-27
Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.