Wednesday, 23 September 2015 11:16

iOS is not safe – fact #iOSdisaster Featured

By

The recent malware discovery of 3,418 XcodeGhost infected apps in Apple’s so-called safe Chinese iTunes app store is sufficient evidence to dispel the myth that iOS is safe – it is not.

If you wish to read the latest on XcodeGhost and iOS click here.

I wrote a report in April 2015 titled ‘Is Apple’s iOS a malware magnet’ and it's worth a read now to refresh your memory. It was a companion article to ‘Is Android a malware magnet?’ and ‘Is Apple’s OS X a Malware magnet?’

It is time – not to re-write those articles because they are still relevant – but to look at what has happened since April. It iordsoiwrd hacknsomware, and trehion apps in the store - Spource ly exploited bfrom hundreds of thousands of independent develpps not pretty for iOS.

Let’s start with the Apple assertion (quote) “The iOS platform is completely secure – Apple designed the iOS platform with security at its core. Keeping information secure on mobile devices is critical for any user, whether they are accessing corporate and customer information or storing personal photos, banking information, and addresses. Because every user’s information is important, iOS devices are built to maintain a high level of security without compromising the user experience."

This is clearly nothing more than marketing hype.

Vulnerability challenge

Zerodium has offered a US$1 million iOS 9 bug bounty (and $3 million in total) for a browser-based, and untethered jailbreak for the latest Apple iOS 9 operating system and devices. It is focused on “high-risk flaws accompanied by a fully functional and reliable exploit leading to arbitrary code execution, or privilege escalation, or sandbox bypass/escape, or sensitive information disclosure.”

Zerodium says, “Apple iOS, like all operating system, is often affected by critical security vulnerabilities, however due to the increasing number of security improvements and the effectiveness of exploit mitigations in place, Apple's iOS is currently the most secure mobile OS. But don't be fooled, secure does not mean unbreakable, it just means that iOS has currently the highest cost and complexity of vulnerability exploitation.”

I think there are several words there that need to be clarified.

  • ‘often affected’ – how often?
  • ‘critical security vulnerabilities’ – how critical?
  • ‘the most secure mobile OS’ – not true as Windows Phone has just one reported vulnerability
  • ‘But, don’t be fooled’ - perhaps the most telling words in this statement

And finally Zerodium may not find a vulnerability and not have to pay out – the competition ends on 31 October. Why isn’t Apple offering a bug bounty? Microsoft, Google, and many more – in fact, 152 software organisations offer this.

CVE now lists 694 vulnerabilities in iOS – up from 127 listed in April. Remember that most — not all — of these have been actioned by Apple in its iOS 9 release. This increase simply means that cyber criminals have now decided iOS is the next big target.

By comparison

  • Windows (apart from Windows Mobile OS) – in its entirety has had 727 vulnerabilities – only seven were discovered in 2014 and it's too early to tell for Windows 10
  • OS X in its entirety – has had 1206 vulnerabilities – 352 of these discovered in 2014/15 so far
  • Android is a little more complex as there are 47 versions starting from 1.0 to 5.x but in total there are 54 main vulnerabilities and an unknown number of variations.

Many of the issues are caused by programs like Flash and Java with 545/413 vulnerabilities that affect multiple OSs.

All OS makers have learned lessons and only take responsibility for apps loaded via their own app stores. Windows cannot do that (except on Windows Phone and later Windows 10 Mobile) as it has depended on user installable programs from hundreds of thousands of independent developers.

Back to iOS and its app store checking process

Apps are entirely checked by other software – with little human intervention apart from whether they look good. There are scans for malicious code that XcodeGhost could disguise in a compiled app. Xcode also passed Apple’s Gatekeeper technology and was allowed to execute on iOS — a major issue — so much for sandboxing.

In April, more than 1,000 iOS apps in iTunes were found to have an SSL exploit that could compromise users' banking details. It was not maliciously exploited by cyber criminals – but it could have been. Prior to that, there was the potential for WireLurker (via USB from Mac or Windows), Masque, HeartBleed, ShellShock, Olag Pliss ransomware (driven by Find my Phone cloud vulnerability), Safari vulnerabilities, Java and Flash vunerabilites, and the iCloud Jennifer Lawrence password hack. Many vulnerabilities are initially aimed at OSX and can be modified for iOS which has UNIX roots too.

According to Source DNA there are too many apps in the store to keep up-to-date. Sadly, many developers do not actively keep their apps up-to-date with bug fixes, and there are a bunch of apps which are still using the broken version of AFNetworking, despite the availability of a patch. SourceDNA analysed 20,000 apps which contain versions of the AFNetworking package, and determined that about 1,000 are still using the broken SSL check. Apple claim over 1 million apps in the store.

Security firm Sophos comments, “Apple’s walled garden App Store — where applications are fully vetted before being made available to customers — has prevented widespread malware infection of iOS users … Evidence of malware showing up in the App Store is anecdotal at best, as Apple does not typically volunteer such information. iOS is vulnerable. Take the tale of Charlie Miller, a security researcher who deliberately created a suspicious application and submitted it to Apple. Apple initially approved the application, which uncovered a bug in iOS …”

Conclusions

It appears that cyber-attacks on iOS will ramp up in the future.

Apple does not help by continuing to insist, nay convince people, that they do not need to protect their devices.

Apple does not help by ignoring this and not seeking independent help from the security industry.

Apple does not help by preventing malware infected apps making their way into its supposedly safe app stores.

Apple does not comment …

I don’t care if it's Android, iOS, Windows, OS X or Linux – the greatest security issue is you. Poor passwords, opening phishing emails, loading mal/ware/spyware, and complacency are all major contributors.

Read 23984 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here




Maximising Cloud Efficiency - LUMEN WEBINAR 23 April 2025

According to KPMG, companies typically spend 35% more on cloud than is required to deliver business objectives

The rush to the cloud has led to insufficient oversight, with many organisations struggling to balance the value of cloud agility and innovation against the need for guardrails to control costs.

Join us for an exclusive webinar on Cloud Optimisation.

In this event, the team from Lumen will explain how you can maximise cloud efficiency while reducing cost.

The session will reveal how to implement key steps for effective cloud optimisation.

Register for the event now!

REGISTER!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Ray Shaw

joomla stats

Ray Shaw ray@im.com.au  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

Share News tips for the iTWire Journalists? Your tip will be anonymous

Subscribe to Newsletter

*  Enter the security code shown: img0