Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile Security //


End of Bibblio RCM includes -->
09:35 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now

iPhone Users Targeted in Mobile Malware Attack

Cisco Talos has found a complex mobile malware attack that tricks users into downloading compromised MDM software onto their iPhones.

A mobile malware attack is targeting iPhone users in India by tricking them into downloading open source, mobile device management (MDM) software that can take control of the smartphone and reveal personal data, as well as location, according to a new report.

So far, the attack has only infected about 13 different iPhones in India but the sophisticated nature of the campaign -- using software that looks like an MDM application -- is putting security researchers on alert.

In their report, researchers with Cisco Talos write that they are not completely sure how the attackers gained control of the iPhones, but it seems that they used social engineering techniques to trick users into either downloading the malicious software or giving access to the physical device.

Once downloaded, the malware can then replace legitimate mobile apps in order to steal data such as SMS messages, or report back on the physical location of a particular iPhone.

Overall workflow of the attack\r\n(Source: Talos)\r\n
Overall workflow of the attack
\r\n(Source: Talos)\r\n

Specifically, the attacks use a BOptions sideloading technique to add features to legitimate apps, including WhatsApp and Telegram. From there, the person or persons behind the malware can gain almost unlimited access to the device and the data:

The purpose of the BOptions sideloading technique is to inject a dynamic library in the application. The malicious code inserted into these apps is capable of collecting and exfiltrating information from the device, such as the phone number, serial number, location, contacts, user's photos, SMS and Telegram and WhatsApp chat messages.

Talos researchers were able to find the MDM logs on a server, and it appears the group behind the malware has been operating since at least 2015.

These servers also contained some clues about the attackers themselves. Researchers found that the group may have tested the attack on their own phones first, and the names "test" and "mdmdev" were found on the server, along with telephone numbers registered to "Vodafone India."

It appears from this that the attackers are based in India, although they also left false clues to hide their identity.

Boost your understanding of new cybersecurity approaches at Light Reading's Automating Seamless Security event on October 17 in Chicago! Service providers and enterprise receive FREE passes. All others can save 20% off passes using the code LR20 today!

What makes the attack particularly troubling is that MDM software allows a third-party complete control of a smartphone or another device. With more enterprises using MDM apps, the fact that the group was able to reproduce an authentication process and certificates, means that end users and security pros need to be aware of unusual requests for access to devices.

"By installing a certificate outside of the Apple iOS trusted certificate chain, you may open up to possible third-party attacks like this," Talos researchers wrote in the July 12 post. "Users must be aware that accepting an MDM certificate is equivalent to allowing someone … access to their device, passwords, etc."

The Talos researchers have been in contact with Apple to remove some of the malicious applications associated with the attack.

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Practical Network Security Approaches for a Multicloud, Hybrid IT World
The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy: -increase visibility over the environment -learning cloud-specific skills -relying on established security frameworks -re-architecting the network
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-05-09
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
PUBLISHED: 2022-05-09
In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to tra...
PUBLISHED: 2022-05-08
ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
PUBLISHED: 2022-05-08
marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.
PUBLISHED: 2022-05-08
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.