Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile Security //

MDM

7/17/2018
09:35 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

iPhone Users Targeted in Mobile Malware Attack

Cisco Talos has found a complex mobile malware attack that tricks users into downloading compromised MDM software onto their iPhones.

A mobile malware attack is targeting iPhone users in India by tricking them into downloading open source, mobile device management (MDM) software that can take control of the smartphone and reveal personal data, as well as location, according to a new report.

So far, the attack has only infected about 13 different iPhones in India but the sophisticated nature of the campaign -- using software that looks like an MDM application -- is putting security researchers on alert.

In their report, researchers with Cisco Talos write that they are not completely sure how the attackers gained control of the iPhones, but it seems that they used social engineering techniques to trick users into either downloading the malicious software or giving access to the physical device.

Once downloaded, the malware can then replace legitimate mobile apps in order to steal data such as SMS messages, or report back on the physical location of a particular iPhone.

Specifically, the attacks use a BOptions sideloading technique to add features to legitimate apps, including WhatsApp and Telegram. From there, the person or persons behind the malware can gain almost unlimited access to the device and the data:

The purpose of the BOptions sideloading technique is to inject a dynamic library in the application. The malicious code inserted into these apps is capable of collecting and exfiltrating information from the device, such as the phone number, serial number, location, contacts, user's photos, SMS and Telegram and WhatsApp chat messages.

Talos researchers were able to find the MDM logs on a server, and it appears the group behind the malware has been operating since at least 2015.

These servers also contained some clues about the attackers themselves. Researchers found that the group may have tested the attack on their own phones first, and the names "test" and "mdmdev" were found on the server, along with telephone numbers registered to "Vodafone India."

It appears from this that the attackers are based in India, although they also left false clues to hide their identity.


Boost your understanding of new cybersecurity approaches at Light Reading's Automating Seamless Security event on October 17 in Chicago! Service providers and enterprise receive FREE passes. All others can save 20% off passes using the code LR20 today!

What makes the attack particularly troubling is that MDM software allows a third-party complete control of a smartphone or another device. With more enterprises using MDM apps, the fact that the group was able to reproduce an authentication process and certificates, means that end users and security pros need to be aware of unusual requests for access to devices.

"By installing a certificate outside of the Apple iOS trusted certificate chain, you may open up to possible third-party attacks like this," Talos researchers wrote in the July 12 post. "Users must be aware that accepting an MDM certificate is equivalent to allowing someone … access to their device, passwords, etc."

The Talos researchers have been in contact with Apple to remove some of the malicious applications associated with the attack.

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Inside North Korea's Rapid Evolution to Cyber Superpower
Kelly Sheridan, Staff Editor, Dark Reading,  12/1/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27409
PUBLISHED: 2020-12-04
OpenSIS Community Edition before 7.5 is affected by a cross-site scripting (XSS) vulnerability in SideForStudent.php via the modname parameter.
CVE-2020-27408
PUBLISHED: 2020-12-04
OpenSIS Community Edition through 7.6 is affected by incorrect access controls for the file ResetUserInfo.php that allow an unauthenticated attacker to change the password of arbitrary users.
CVE-2020-27765
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause ot...
CVE-2020-27766
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long`. This would most likely lead to an impact to application availability, b...
CVE-2020-27767
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of types `float` and `unsigned char`. This would most likely lead to an impact to application avai...