Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:50 PM
George V. Hulme
George V. Hulme

Researcher: iPhone Data Easy To Cultivate

While there hasn't been any attacks on iPhones that haven't been jailbroken, one researcher has shown that once a rogue application makes its way onto the device - there's not much it can't do with your data.

While there hasn't been any attacks on iPhones that haven't been jailbroken, one researcher has shown that once a rogue application makes its way onto the device - there's not much it can't do with your data.iPhone developer Nicolas Seriot recently released a proof-of-concept application, SpyPhone, that demonstrates how the public iPhone API can be used to grab data from other applications, such as the keyboard cache or address book. All of SpyPhone's snooping is done in the background, so a user would have no way to know. Email sends the snatched data back to the snooper.

Of course, an attacker wouldn't call their application "Spyphone." Rather, they'd integrate such capabilities into an application that purports to be useful, or fun, such as a game - and Trojan horse designed for the smartphone is born.

The trick would be getting such a Trojan past the AppStore application gatekeepers.

That, says Seriot in this presentation [.pdf], isn't as difficult as one might expect. Unlike known viruses, which could be found through signatures, Trojans are more difficult to identify. The spyware or keystroke logging capabilities could be left latent for weeks, or months, until many have downloaded the application. And the data sent back to the attacker could be encrypted. Perhaps the spyware capabilities could be added at a later date, through what appears to be a standard update. How long would it take such a nefarious application to be spotted?

Who knows for sure, but probably long enough to do considerable damage.

I do agree with Seriot that, because AppStore reviewers have to examine so many applications, and it's easy enough to obfuscate spyware capabilities, that something bad is bound to get through one day.

Some may argue that the threat of a Trojan application getting into the AppStore and into user devices is paranoid thinking - I say it's just a matter of time. But this threat is no different than the Trojan threat that has always existed on PCs and smartphones.

Seriot recommends Apple make it so that the end user would be prompted to authorize applications to read or write to the AddressBook and that the keyboard cache be made a service of the operating system. He also suggests a firewall be placed on the iPhone that can vet outgoing traffic. Sounds reasonable to me.

He also contends, until then, that users keep the iPhone on Airplane Mode. I wouldn't go so far as to keep Airplane Mode on, but it's certainly a good idea to be careful what games and applications are downloaded from the AppStore.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/1/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Attacker Dwell Time: Ransomware's Most Important Metric
Ricardo Villadiego, Founder and CEO of Lumu,  9/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-10-01
CMS Made Simple 2.2.14 allows an authenticated user with access to the Content Manager to edit content and put persistent XSS payload in the affected text fields. The user can get cookies from every authenticated user who visits the website.
PUBLISHED: 2020-10-01
GetSimple CMS 3.3.16 allows in parameter 'permalink' on the Settings page persistent Cross Site Scripting which is executed when you create and open a new page
PUBLISHED: 2020-10-01
WebsiteBaker 2.12.2 allows SQL Injection via parameter 'display_name' in /websitebaker/admin/preferences/save.php. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
PUBLISHED: 2020-10-01
A vulnerability has been discovered in the ace.xmd parser that results from a lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. This can result in denial-of-service. This issue affects: Bitdefender Engines version 7.84892 and prior vers...
PUBLISHED: 2020-10-01
Upgrading Crowd via XML Data Transfer can reactivate a disabled user from OpenLDAP. The affected versions are from before version 3.4.6 and from 3.5.0 before 3.5.1.