Reuters The biggest attack on the iOS platform

Apple is reportedly very busy cleaning up malware that has infected its apps , from the first big one on the platform iOS, as reported by Reuters.apple iOS

Several iOS apps, like the WeChatThe της κινέζικης υπηρεσίας ταξί Didi Kuaidi, το εργαλείο σάρωσης καρτών CamCard, και άλλες βρέθηκαν να περιέχουν κακόβουλο κώδικα.

Σύμφωνα με την εταιρεία ασφαλείας Palo Alto Networks o κακόβουλος κώδικας θα μπορούσε, να ψαρεύει τα στοιχεία των χρηστών, να κλέβει διευθύνσεις URL, να διαβάσει και να γράψει δεδομένα των χρηστών από το πρόχειρο, όπως ας πούμε τους of access.

As you can see, the myth of the "invincible" Apple is gone!

The application code seems to have been developed with XcodeGhost, a fake version of Apple's Xcode software used to build iOS and Mac applications.

Apple spokeswoman Christine Monaghan told Reuters:

We have deleted App Store apps that we know are created with this fake software. We work with developers to make sure they use the correct version of Xcode to develop their applications.

Security company Palo Alto Networks said it has not detected any signs indicating data theft or other damage as a result of the attack.

The security firm also said developers using XocdeGhost instead of an official Apple tool downloaded it from a server in China.

The most frightening of this story is that many reputable malware-infected applications have been able to pass Apple's code controls and go up to Apple Store completely unnoticed.

Let's mention that Apple and her friends were very proud of the security of the software distributed by the company's store.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).