The XcodeGhost malware spread to millions of iPhones
The information revealed around the legal confrontation between Epic Games and Apple surprised many iPhone users.
According to documents published in the Epic Games-Apple lawsuit, the malware attack took place in 2015 with about 128 million iPhone and iPad devices being infected.
The XcodeGhost malware was spread by hackers through the hidden installation of a version of Xcode programming software, then sharing on forums for iOS developers. Some of these malicious applications at that time included many popular names such as WeChat, the Chinese version of Angry Birds 2. Statistics show that about 2,500 applications were infected with malware and up to 203 million. users who downloaded these anti-malware applications
Security experts believe that the XcodeGhost malware can collect information such as infected application name, device model, network information and some other data. Later, Apple said it did not record data associated with the user's identity, or the iCloud login password was collected.
After the problem was discovered, Apple asked developers to use the official version of Xcode to compile the app before re-releasing it on the App Store. According to 9to5mac , Apple also strengthens the security process when installing Xcode, checking the application's malicious code before releasing it on the App Store after the incident.
You've just finished reading the article "The XcodeGhost malware spread to millions of iPhones" edited by the TipsMake team. You can save the-xcodeghost-malware-spread-to-millions-of-iphones.pdf to your computer here to read later or print it out. We hope this article has provided you with many useful tech tips and tricks. You can search for similar articles on tips and guides. Thank you for reading and for following us regularly.
- A new kind of malware is spreading through Messenger and Skype spam messages
- Mysterious malware threatens millions of routers and IoT devices
- Microsoft warns of new malware threat spread through Teams
- 5 tips to help detect signs of malware
- Opening a dangerous malware store can clean up your bank account on the black web
- Hacker exploited three vulnerabilities in Microsoft Office to spread Zyklon malware