New iOS spyware targets non-jailbroken devices but requires user intervention to install

Posted:
in iPhone edited February 2015
A malware campaign known in the security industry as "Operation Pawn Storm" has begun to target Apple's iOS devices with a new malicious application that can steal photos, text messages, contacts, and other data from non-jailbroken iPhones, but which cannot be installed without users' consent.


A phishing page used to spread XAgent malware. Source: Trend Micro


Dubbed XAgent by security firm Trend Micro, the new spyware has been observed using Apple's ad-hoc provisioning system as an infection vector. This functionality is intended for enterprises and developers who wish to distribute apps to a small group of individuals and allows users to bypass the App Store.

This is a cumbersome process which presents multiple notifications to the user that an app will be installed. As a result, Operation Pawn Storm is thought to target specific individuals by infecting those around them in the hope that installation instructions received from their circle of friends or colleagues will be more readily followed.

"The good thing for users is that this isn't something that can be automatically done," Trend Micro executive Jon Clay told Macworld. "There are steps you have to do as a user to install this."

Once installed on devices running iOS 7, XAgent runs without an app icon and is capable of automatically restarting itself. This is not the case on iOS 8 --?users would be forced to manually open the app if it closed or the device was restarted, which leads Trend Micro to believe the spyware was designed before iOS 8 was released.

XAgent is designed to collect text messages, contact lists, pictures, geolocation data, information on installed apps and running processes, as well as Wi-Fi status. Additionally, it can be configured to begin recording audio using the device's built-in microphone and transfer those recordings to a command and control server.

As usual, users can mitigate their risk by not clicking on suspicious links, even if they appear to come from a trusted source.
«1

Comments

  • Reply 1 of 23
    nagrommenagromme Posts: 2,834member
    They may as well just include "Jailbreak your iPhone" as step one of a malware campaign.
  • Reply 2 of 23
    ecatsecats Posts: 272member
    I'm sure if security researchers did some actual work they could probably find exploits more interesting than this. Running to the uninformed press about misusing a built in feature is not an exploit. You might as well provide the instructions:

    Step 1. Pick up hammer

    Step 2. Slam hammer down on phone repeatedly

    OMG, HAMMER is an exploit.
  • Reply 3 of 23
    What kind of prompt does this bring up?
  • Reply 4 of 23
    beltsbear wrote: »
    What kind of prompt does this bring up?

    It is a prompt for accepting installation of the apication. I think Apple can revoke the certificate of anyone doing this. Not sure how it could be a real threat given that.
  • Reply 5 of 23

    Something that needs to be fixed before this becomes an issue is the automatic redirects that websites have now, where it kicks you to the App Store for some garbage freemium game.

  • Reply 6 of 23
    analogjackanalogjack Posts: 1,073member
    Quote:

    Originally Posted by ECats View Post



    I'm sure if security researchers did some actual work they could probably find exploits more interesting than this. Running to the uninformed press about misusing a built in feature is not an exploit. You might as well provide the instructions:



    Step 1. Pick up hammer



    Step 2. Slam hammer down on phone repeatedly



    OMG, HAMMER is an exploit.

     

    This is exactly why I would never buy a Chinese hammer from eBay.

  • Reply 7 of 23
    beltsbear wrote: »
    What kind of prompt does this bring up?

    The exploit asks you three questions, which you have to answer correctly to initiate installation:
    1. Is your daddy also your grandpa?
    2. Do you play a banjo?
    3. Are these questions being read to you?

    Any glimmer of intelligence and the installation is aborted.
  • Reply 8 of 23
    lkrupplkrupp Posts: 10,557member

    OMG! Everybody RUN and hide under your beds. The Boogeyman is gonna get you.

  • Reply 9 of 23
    tenlytenly Posts: 710member
    They probably target freemium gamers with promises of free in-game gems, diamonds, gold, ice, etc if they follow "these instructions" and then rely on people's greed to overcome their intelligence. Sadly, this probably happens a lot.
  • Reply 10 of 23
    lkrupp wrote: »
    OMG! Everybody RUN and hide under your beds. The Boogeyman is gonna get you.
    He's their to
  • Reply 11 of 23
    arlorarlor Posts: 532member

    Almost all malware requires user intervention at some level. Browser addons won't install without intervention, for example. All the crap that gets packaged with installers nowadays requires you to fail to note that extra stuff is getting installed.

     

    The fact that this can apparently bypass the app store on non-jailbroken devices is what's scary. I hope Apple can fix it with something as simple as a certificate revocation.

  • Reply 12 of 23
    fallenjtfallenjt Posts: 4,054member
    Quote:

    Originally Posted by TheWhiteFalcon View Post

     

    Something that needs to be fixed before this becomes an issue is the automatic redirects that websites have now, where it kicks you to the App Store for some garbage freemium game.


    Well, whoever click on a link to install the application deserves it. Don't tell me anyone owing an idevice didn't know already that apps should be installed from App store only.

  • Reply 13 of 23
    nagromme wrote: »
    They may as well just include "Jailbreak your iPhone" as step one of a malware campaign.

    Except that you don't need a jailbroken iPhone to get this.
  • Reply 14 of 23
    www.jobs.mill.com
  • Reply 15 of 23
    iOS isn't secure.
    Android isn't secure.
    See? Android is just as good as iOS.
  • Reply 16 of 23
    foggyhillfoggyhill Posts: 4,767member
    Quote:

    Originally Posted by Suddenly Newton View Post



    iOS isn't secure.

    Android isn't secure.

    See? Android is just as good as iOS.

     

    So, I guess a Yugo is just as resistant to accidents as a Tank because the result of them being hit by a meteorite is just the same...

  • Reply 17 of 23
    He's there too

    There, fixed that for you...
  • Reply 18 of 23
    Quote:

    Originally Posted by foggyhill View Post

     

     

    So, I guess a Yugo is just as resistant to accidents as a Tank because the result of them being hit by a meteorite is just the same...


    Clever

  • Reply 19 of 23

    Thank you, it was hurting my brain to see it written like that.

  • Reply 20 of 23
    dysamoriadysamoria Posts: 3,430member
    fallenjt wrote: »
    Well, whoever click on a link to install the application deserves it. Don't tell me anyone owing an idevice didn't know already that apps should be installed from App store only.

    The person you quoted wasn't talking about clicking on links. There's an App Store redirect that happens without any user intervention at all. It's freaking annoying and I thought Apple was supposed to have fixed it in iOS 7!!!
Sign In or Register to comment.