Apple’s iOS App Store suffers first major attack
BOSTON: Apple Inc has said that it is cleaning up its iOS App Store to remove malicious iPhone and iPad programs identified in the first large-scale attack on the popular mobile software outlet. The company disclosed the effort after several cyber security firms reported finding a malicious program dubbed XcodeGhost
By our correspondents
September 22, 2015
BOSTON: Apple Inc has said that it is cleaning up its iOS App Store to remove malicious iPhone and iPad programs identified in the first large-scale attack on the popular mobile software outlet.
The company disclosed the effort after several cyber security firms reported finding a malicious program dubbed XcodeGhost that was embedded in hundreds of legitimate apps.
It is the first reported case of large numbers of malicious software programs making their way past Apple's stringent app review process. Prior to this attack, a total of just five malicious apps had ever been found in the App Store, according to cyber security firm Palo Alto Networks Inc.
The hackers embedded the malicious code in these apps by convincing developers of legitimate software to use a tainted, counterfeit version of Apple's software for creating iOS and Mac apps, which is known as Xcode, Apple said.
"We’ve removed the apps from the App Store that we know have been created with this counterfeit software," Apple spokeswoman Christine Monaghan said in an email.
"We are working with the developers to make sure they’re using the proper version of Xcode to rebuild their apps."
She did not say what steps iPhone and iPad users could take to determine whether their devices were infected.
Palo Alto Networks Director of Threat Intelligence Ryan Olson said the malware had limited functionality and his firm had uncovered no examples of data theft or other harm as a result of the attack.
Still, he said it was "a pretty big deal" because it showed that the App Store could be compromised if hackers infected machines of software developers writing legitimate apps. Other attackers may copy that approach, which is hard to defend against, he said.
"Developers are now a huge target," he said.
Researchers said infected apps included Tencent Holdings Ltd’s popular mobile chat app WeChat, car-hailing app Didi Kuaidi and a music app from Internet portal NetEase Inc.
The tainted version of Xcode was downloaded from a server in China that developers may have used because it allowed for faster downloads than using Apple's U.S. servers, Olson said.
Chinese security firm Qihoo360 Technology Co said on its blog that it had uncovered 344 apps tainted with XcodeGhost. Apple declined to say how many apps it had uncovered.
The company disclosed the effort after several cyber security firms reported finding a malicious program dubbed XcodeGhost that was embedded in hundreds of legitimate apps.
It is the first reported case of large numbers of malicious software programs making their way past Apple's stringent app review process. Prior to this attack, a total of just five malicious apps had ever been found in the App Store, according to cyber security firm Palo Alto Networks Inc.
The hackers embedded the malicious code in these apps by convincing developers of legitimate software to use a tainted, counterfeit version of Apple's software for creating iOS and Mac apps, which is known as Xcode, Apple said.
"We’ve removed the apps from the App Store that we know have been created with this counterfeit software," Apple spokeswoman Christine Monaghan said in an email.
"We are working with the developers to make sure they’re using the proper version of Xcode to rebuild their apps."
She did not say what steps iPhone and iPad users could take to determine whether their devices were infected.
Palo Alto Networks Director of Threat Intelligence Ryan Olson said the malware had limited functionality and his firm had uncovered no examples of data theft or other harm as a result of the attack.
Still, he said it was "a pretty big deal" because it showed that the App Store could be compromised if hackers infected machines of software developers writing legitimate apps. Other attackers may copy that approach, which is hard to defend against, he said.
"Developers are now a huge target," he said.
Researchers said infected apps included Tencent Holdings Ltd’s popular mobile chat app WeChat, car-hailing app Didi Kuaidi and a music app from Internet portal NetEase Inc.
The tainted version of Xcode was downloaded from a server in China that developers may have used because it allowed for faster downloads than using Apple's U.S. servers, Olson said.
Chinese security firm Qihoo360 Technology Co said on its blog that it had uncovered 344 apps tainted with XcodeGhost. Apple declined to say how many apps it had uncovered.
-
NASA Artemis II Moon Mission Captures Stunning Earth Images During Historic Lunar Journey -
Kanye West And Lauryn Hill Send SoFi Stadium Into Total Meltdown: 'GOAT Is Back' -
Canadian Citizenship New Eligibility Rules Explained: Who Qualifies And What Has Changed -
Naomi Scott Reveals ‘encouraging’ Aspect Of Making Debut In Music -
Polar Vortex Enters Final ‘seasonal’ Phase: Rare Shift Signals Winter Weather Risks Into April -
Meta Pauses Mercor Work After Major Data Breach -
A10 Warthog Hit As US Jet Downed In Iran, One Crew Rescued And Search Underway For Second -
Zach Bryan Reveals Why He Cancelled Oklahoma Concert At Last Minute -
Meningococcal Disease, Dangerous Bacterial Infection, Hits Decade High In Canada -
Blake Lively's Latest Statement Shakes Up Legal Battle With Justin Baldoni -
Alejandro Kirk Injury Concern Grows As Blue Jays Await X-ray Results After His Exit -
Kelly Osbourne Shares Sweet Family Moment Post Sid Wilson Split -
Patrick Corbin Joins Blue Jays On $1 Million Contract After Improved 2025 Season -
Sam Altman's OpenAI Buys TBPN To Expand Communication Strategy And Shape AI Public Debate -
Angelina Jolie, Brad Pitt's Daughter, Shiloh Makes Surprise Music Video Debut -
‘Very Angry’ Sarah Ferguson Finally Willing To Sell Out The King & Firm?: Inside Revenge Plans