Hackers find way to attack Apple devices

08 Aug 2015

1

People who owned Apple devices at one time, could feel safe from hack attacks, but times had changed.

Most hackers focused on Windows machines as these constituted the biggest target, but  researchers are finding more security holes in machines containing Apple operating systems , which made them prime targets for hacks.

According to security company FireEye, which issued a report this week hackers had found a way to break into iOS devices with the help of legitimate-looking but malicious apps downloaded to one's phone.

The security company learned about the hacks by examining roughly 400 GB of corporate data that was leaked when hackers breached the cybersecurity firm Hacking Team.

While FireEye had warned of the possibility of these so-called masque attacks earlier, the company claimed that its recent discovery was the first instance of the attacks actually occurring outside of a test lab environment.

Masque attacks happened when users unwittingly downloaded malicious apps to their Apple device by clicking on a shady web link.

According to experts, the recently discovered issue would likely not affect a large number of users, but it had massive potential for hackers because of the way it operated - it fooled the iPhone into downloading a malicious app that replicated an actual app on to users' phone that it then replaced it covertly.

The malicious app could then be used by hackers for various purposes without the knowledge of the iPhone user.

Researchers from FireEye told Business Insider, though the apps looked and performed like genuine apps, they had components that could activate additional silent functions, such as spying on conversations or uploading personal data to a server that was also controlled by attackers.

Fake apps of the type had already been found in the wild and had been replicating popular apps including Twitter, Facebook, WhatsApp, Viber, Skype and others.

However, users need to know that the security threat acted together with a phishing email or message.

In other words, the threat came from downloading the malicious app, which happened after users clicked on a particular link in an email or message.

Hackers managed to bypass Apple's security with the ''Masque'' attack, when users clicked the link, which tricked the iPhone into believing it connected to the App Store.

Business History Videos

History of hovercraft Part 3 | Industry study | Business History

History of hovercraft Part 3...

Today I shall talk a bit more about the military plans for ...

By Kiron Kasbekar | Presenter: Kiron Kasbekar

History of hovercraft Part 2 | Industry study | Business History

History of hovercraft Part 2...

In this episode of our history of hovercraft, we shall exam...

By Kiron Kasbekar | Presenter: Kiron Kasbekar

History of Hovercraft Part 1 | Industry study | Business History

History of Hovercraft Part 1...

If you’ve been a James Bond movie fan, you may recall seein...

By Kiron Kasbekar | Presenter: Kiron Kasbekar

History of Trams in India | Industry study | Business History

History of Trams in India | ...

The video I am presenting to you is based on a script writt...

By Aniket Gupta | Presenter: Sheetal Gaikwad

view more
View details about the software product Informachine News Trackers