The XcodeGhost malware spread to millions of iPhones
According to documents published in the Epic Games-Apple lawsuit, the malware attack took place in 2015 with about 128 million iPhone and iPad devices being infected.
The XcodeGhost malware was spread by hackers through the hidden installation of a version of Xcode programming software, then sharing on forums for iOS developers. Some of these malicious applications at that time included many popular names such as WeChat, the Chinese version of Angry Birds 2. Statistics show that about 2,500 applications were infected with malware and up to 203 million. users who downloaded these anti-malware applications
Security experts believe that the XcodeGhost malware can collect information such as infected application name, device model, network information and some other data. Later, Apple said it did not record data associated with the user's identity, or the iCloud login password was collected.
After the problem was discovered, Apple asked developers to use the official version of Xcode to compile the app before re-releasing it on the App Store. According to 9to5mac , Apple also strengthens the security process when installing Xcode, checking the application's malicious code before releasing it on the App Store after the incident.
You should read it
- Warning: New malicious code is infecting about 500,000 router devices
- 14 games on the App Store contain malicious code, iPhone users be careful
- After WannaCry, Petya's 'extortion' malicious code is raging, this is a remedy to prevent
- Malicious code is growing up
- Find bug in Emotet malware, prevent it from spreading for 6 months
- 10 million Android devices are preinstalled with malicious code from the factory
- Detects malicious code showing porn ads in children's games on Google Play
- Malware sneaks into iOS through Apple's official distribution channels
May be interested
- How to completely eliminate malicious code on iPhone?xcodeghost is a form of exploit that allows hackers to attack spies on mobile devices to steal passwords, and at the same time both personal information and user devices. specifically, according to mashable, an attacker can steal both apple id and icloud password.
- Docker Hub is used by hackers to spread Cryptojacking malwaremalicious software is installed by the hacker into docker images and spreads through the docker hub itself.
- Conficker worm still raging in TM Datacenter data centercalled conficker, the type of computer sieves spread across millions of computers around the world and left tremendous consequences.
- Hackers use a map to track the situation of the Corona virus to spread malwaresecurity researchers have discovered many fake covid-19 tracking maps, which when opened will unknowingly allow malware to infiltrate the computer.
- Malware using machine learning technology, downloaded more than 240,000 times by Android userssparkcat has several notable features that make its spread more dangerous than ever.
- How do criminals use CAPTCHAs to spread malware?unfortunately, bad actors know this and have created fake captchas that will infect your pc with malware.
- Warning campaign to spread malicious code through 'green tick' pages on Facebookmalware advertising activities are distributed by hackers through compromised facebook pages.
- Viruses spread quickly through MSN Messengera trojan is being spread indirectly via msn messenger messaging software, causing thousands of affected computers along with an increase in the number of malware-infected systems.
- GIBON extortion code spread through spama new ransomware called gibon, once again malspam (malware spread via email) attaches a malicious file and contains the download macro, installs the malicious code to blackmail the victim's computer.
- How many types of malware do you know and how to prevent them?currently, computer criminals use a lot of different malware (malware) to attack the system. here are some of the most common malware types and ways to prevent them.