Detect spyware targeting iOS users
Network security researchers have recently discovered the iOS version of a phone spy application, originally designed to target Android devices through applications on Google Play Store.
This malware is named Exodus. It is spyware that works on iOS, developed based on the Android version that was discovered by security researchers at LookOut during the analysis of Android models they found last year. .
- Reveal personal data of more than 1.3 million people from a vulnerability in web application
Unlike the Android variant, the Exodus version on iOS has been distributed outside Apple's official App Store, primarily through phishing sites designed to mimic Italian and Turkmenistan mobile operators to benefit. use lightness from the victim.
Besides, because Apple has always maintained a policy of restricting the application setting directly outside the app store, it is officially the App Store, so the iOS version of Exodus switched to abuse Apple Developer Enterprise program, allowing businesses distribute internal applications directly to their employees without using iOS's App Store, thereby spreading them to personal user devices.
- Hackers antivirus application preinstalled on Xiaomi phones into malware
This malicious information is shared by LookOut's security experts in a blog post as follows:
"Each phishing site will contain links to a distribution manifest, which contains metadata such as the application name, version, icon and URL for the IPA file. All of these packages used the profile provided with the distribution certificate associated with the company named Connexxa SRL '.
Although the iOS variant of Exodus is less sophisticated than the version on Android, these spyware can still filter important and basic personal information from targeted iPhone devices including , contacts, recording, photos, videos, GPS location and device information.
The stolen data will then be transmitted through HTTP PUT requests to the endpoint on the attacker's command and control server (command and control server), which is a CnC infrastructure like used with the Android version, and also uses the same communication protocols.
- Google: Play Protect helped cut 20% of malicious Android application installations by 2018
In addition, some technical details also indicate that Exodus "may be the product of a sponsored spy code development project" and aims to target government or law enforcement agencies. law of the state.
"The operation mechanism of this malicious code includes the use of certificate pinning, general key encryption for communication protocol C2 (C2 communications), and a comprehensive set of monitoring features that are well implemented." , the researchers said.
Developed by an Italian-based company called Connexxa SRL, Exodus appeared on Android at the end of the month before some white-hat hackers from Security Without B Border organization discovered nearly 25 disguised applications. into software services on Google Play Store. Of course these malicious applications were also removed by the tech giant immediately after receiving the notification.
- The alarming increase in the number of attacks targeted at IoT devices
According to information security researchers obtained, Exodus has been developed for at least 5 years. In addition, Exodus on Android usually includes 3 separate deployment stages. First, malicious code will collect basic identification information, such as IMEI and phone number of the targeted device. The second phase includes multiple binary packages that are responsible for deploying a set of monitoring functions. Finally, at the third stage, malicious code will use 'infamous' DirtyCOW exploits (CVE-2016-5195) to gain root control over infected phones. After successful installation, Exodus can perform a large number of spy requests on the device that is difficult to detect. Besides, the Android variant is also designed to keep running on infected devices even when the user turns off the screen.
While the Android version of Exodus is likely to have infected on 'a few thousand devices or more', it is currently not possible to estimate how many iPhones are infected with the iOS Exodus variant.
After being informed by Lookout researchers about Exodus spyware, Apple immediately revoked the business certificate, preventing malicious applications from being installed on the new iPhone and running on devices. infected.
- The unsafe 'feature' on UC Browser allows hackers to take control of Android phones remotely
This is the second case in just one year when an Italian software company was caught distributing spyware applications. Earlier last year, another European-based company was also "caught up" distributing "Skygofree", a dangerous spy tool designed exclusively for Android, to help hackers. Full control over remote infection devices.
You should read it
- Series of Android applications contain malicious code you should remove immediately from your device
- Android apps contain malicious code that uses motion sensors to avoid detection
- Malware Judy attacked more than 36.5 million Android phones
- Most Android anti-virus software cannot detect malicious APK files
- Google 'purged' 24 applications downloaded nearly 500,000 times containing malicious malware
- 238 applications found on Play Store contain malicious code that paralyzes smartphones
- How to detect malicious apps on Android
- Hackers antivirus application preinstalled on Xiaomi phones into malware
May be interested
- The most effective antispyware tool?not long ago, viruses spread from the web and email were the most dangerous enemies of computer users. there is now a new threat - spyware (spyware) - stealing user performance and peace of mind. the 'spyware' label can be assigned to legitimate but annoying programs that the user agrees (but is not aware of), installed on your pc, or refers to programs that install themselves without licensed.
- Spyware replaces virus in enterprise computersspyware is becoming more dangerous and sophisticated but users still cannot take the most basic measures to protect themselves. recent statistics show that nearly 30% of us employees have become victims of programs and programs
- NoAdware v4.0: free from spyware infection!if you have ever accessed websites crack, keygen, downloaded music online ... then your computer may be infected with spyware (spyware).
- The standard of spyware is adopteda coalition of software companies has agreed to a common measure in identifying and destroying spyware ('uninvited' programs) that specialize in monitoring web browsing and making it difficult.
- Trojans use 'sex' to lureusers are promised to provide free access to 'cool' content but eventually find themselves being ... extorted. use attractive porn websites as bait, new spyware programs that have been infecting the system silently and demanding users to buy the program ... to destroy the game.
- Many Android users discover that their phones have spyware installed after traveling to Chinathe first unauthorized installation of spyware installed by kyrgyzstan travelers has been traveling to xinjiang, china a few months ago.
- 5 basic steps to eradicate Spywarespyware causes pop-up ads, changes system settings, changes links to home pages, search pages, and especially reduces performance and destabilizes the system. spyware is one of these
- 7 signs to recognize when your computer is infected with spywarewith the dangerous threats that spyware gives you now, you will wonder how to identify spyware in your system, here are some of the most common signs when your system is infected. you are infected with spyware.
- How to check for spyware on Android devicesspyware can secretly steal your personal information and forward it to malicious third parties for exploitation.
- What should Iphone users do when they are attacked by spyware before warning information from Apple?according to techcrunch, apple sent notifications to users in 92 countries at noon on april 11 vietnam time. accordingly, the iphone manufacturer warns users that they may be the target of an attack from a type of mercenary spyware...