Tuesday, September 22, 2015

Apple vulnerable to hack attacks – NRK

Several hundred applications have now been removed from the App Store after it was discovered that they contain virus program XcodeGhost.

Apple themselves confirm that they have been subjected to an attack and told Reuters that they now working to get developers to reprogram the apps in question.

– A huge thing

Hackers have created a false variant of Apple’s own apputviklerprogram Xcode, which has led to serious developers thus has made virus infected apps.

No one has yet reported data theft linked to the attack, and Ryan Olson who is the chief of security in Palo Alto Networks, told the Guardian that the virus program has limited functionality.

– This is still a big thing, it shows that hackers can spread viruses through infecting machines to developers – this tactic is difficult to defend against.

App Store basically has strict security policies, Olson says that it previously only been reported in five infected apps from the edge.

Propagated from China

The false Xcode application has been spread through Chinese server, and the Chinese security agency Qihoo360 Technology claims to have discovered 344 infected apps. Apple will not even go out with some numbers.

Palo Alto Networks has even published a list of 39 infected apps. Most infected apps are mostly used in China, but the list also includes the names of apps that are popular farther west – such as Angry Birds 2 and WeChat.



These apps are fit

  • WeChat
  • Didi ChuXing
  • Angry Birds 2
  • NetEase
  • Micro Channel
  • iFLYTEK input
  • Railway 12306
  • The Kitchen
  • Card Safe
  • CITIC Bank move card space
  • China Unicom Mobile Office
  • High German map
  • Jane book
  • Eyes Wide
  • Life Smart
  • Mara Mara
  • Medicine two force
  • Himalayan
  • Pocket billing
  • Flush
  • Quick Asked the doctor
  • Lazy weekend
  • Microblogging camera
  • Watercress reading
  • CamScanner
  • CamCard
  • SegmentFault
  • Stocks open class
  • Hot stockmarket
  • Three new board
  • The driver drops
  • OPlayer
  • Mercury
  • WinZip
  • Musical.ly
  • PDFReader
  • Perfect365
  • PDFReader Free
  • WhiteTile
  • IHexin
  • WinZip Standard
  • MoreLikers2
  • CamScanner Lite
  • MobileTicket
  • IVMS -4500
  • OPlayer Lite
  • QYER
  • golf sensing
  • Things
  • Golfsensehd
  • Wallpapers10000
  • CSMBP-AppStore
  • MSL108
  • TinyDeal.com
  • snapgrab copy
  • iOBD2
  • Pocket Scanner
  • CuteCUT
  • AmHexinForPad
  • SuperJewelsQuest2
  • air2
  • InstaFollower
  • CamScanner Pro
  • baba
  • WeLoop
  • Data Monitor
  • MSL070
  • nice dev
  • immtdchs
  • OPlayer
  • FlappyCircle
  • BiaoQingBao
  • SaveSnap
  • Guitar Master
  • jin
  • WinZip Sector
  • Quick Save

(Source: Cult of Mac)

Although Apple has removed the apps in question from the App Store, users who people downloaded the infected apps even remove them from their gadgets on manually view.

– Keep the programs updated

Roger Johnsen, admisnistrerende Director NorSIS, will not call it to attack the developers for a trend, but says there is an expected development direction.

– App Store has been considered to be quite safe. Thus must hackers and criminals to find other ways to plant malicious program codes – they must find another link in the production line to attack.

Johnsen points out that this attack is not something anyone can perform , it is done by competent cyber criminals. He says that it requires a lot of those who perform it, but that opportunities can be huge when they’ve got planta code.

– There need not necessarily be the end user who is the target, it may they will steal codes from talented developers.

Johnsen says that there are three things that ensue:

  • Regular users must keep their programs up to date, and uninstalling software that is not used.
  • Developers must in turn be careful to use original development.
  • The most important thing is that Apple needs to look at security procedures in all its stages of production. They have focused most on the App Store and overlooked security linked to development?
LikeTweet

No comments:

Post a Comment