November 11, 2014 By Shane Schick 2 min read

Through a spear-phishing-like “Masque attack,” attackers are creating iOS apps that resemble popular mobile tools in order to lure unsuspecting iPhone users into entering personal information they can capture, according to security researchers.

A report on AppleInsider said FireEye, the firm that discovered the vulnerability, reported the issue to Apple more than three months ago. So far, however, Apple hasn’t provided a way to protect against the Masque attack on the latest versions of its popular mobile operating system.

Ever since websites became widely used, cybercriminals have created phony websites and used email or other tactics — called phishing — to draw in visitors and rob them of their personal data. A Masque attack is similar in that it begins with a text message to smartphone users with links to an iOS app they already use. When users download what they believe is the latest version, a malicious app replaces the original. As The Next Web pointed out, attackers may be able to steal data from consumers without their being any the wiser because the malicious app looks legitimate.

Apple is already reeling from WireLurker, an iOS Trojan that has reportedly affected an untold number of iPhone users. The two threats share one thing in common: the use of “enterprise provision” profiles. Large companies may not want to post internal apps on Apple’s App Store, and enterprise provision profiles allow them a workaround of sorts.

Security experts told Reuters that there is at least one way to cut off a Masque attack at the pass: A pop-up will give users a choice of whether to install any app updates. Not all developers use text messages or push notifications to promote new versions, so if there is reason to believe Apple hasn’t approved an app, it’s obviously best to not install it. Apple uses something called “bundle identifiers” to give such updates the green light.

Meanwhile, according to Forbes, FireEye said the attacks could have some of the most severe repercussions of any iOS threat to date because the malicious app looks genuine. In other words, if users are fooled into updating their Gmail or banking app, copied versions on attackers’ servers could gather all kinds of passwords or financial information.

As an analysis on Mashable suggested, iPhone users’ best bet to avoid the worst is to check with their IT department if they receive any unexpected app updates that don’t come through Apple’s App Store. In the meantime, many enterprise CISOs are undoubtedly waiting to hear what their companies can do to stem the increasing tide of iOS attacks.

Image Source: Flickr

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today