Allegedly affected Xcode Ghost malware attack 128 million iOS users This is a good example of the kind of advanced attacks that every user needs to be prepared to defend as the platform becomes inherently more secure.
Designer label malware
XcodeGhost This was an intelligent exploit that appeared as a copy of malware-infected Xcode available from a website for Chinese developers. Developers in this area downloaded it because the local network was unreliable and was easier to obtain than the actual code.
Software built using these copies of Xcode was infused with malware, but at a very low level, far behind Apple’s boundary level of trust, many corrupted apps. Has gone through the App Store review process. As a result, the infection has invaded over 4,000 apps and the devices of millions of users.
Apple’s internal email, which was previously confidential and revealed in a recent proceeding, is roughly 128 million customers I have been affected.
recently, Similar attempt To Seed developer with a corrupted version of Xcode called XcodeSpy..And last year I saw an attempt to infect Apple’s ecosystem Use the GitHub repository As a thief code ship.
There are also attempts to exploit vulnerabilities in iOS to allow hackers to launch man-in-the-middle attacks that hijack communication between managed iOS devices and MDM solutions.
Break into capital
Why do hackers face such problems in developing these complex attacks? For money, they know that Apple devices are increasingly being used throughout the world’s most profitable enterprises.
Trend Micro warns: “Attackers are beginning to invest in long-term operations targeting specific processes that companies depend on. They are vulnerable practices, vulnerable systems, and operational operations that can be exploited or exploited. Look for loopholes in. “
If most Fortune 500 companies use Macs, iPads, and iPhones, it’s no surprise that hackers are paying attention to the platform. (They are likely to look for IoT device, Wi-Fi, and broadband provisioning vulnerabilities, and always look for forgotten Windows servers in dusty back rooms.
During the pandemic, there are increasing attempts to exploit the vulnerability. Phishing And Ransomware Increasing exploits. Developing a hack with this level of sophistication is expensive. As such, the most successful attacks appear to come from nation-states and highly organized gangs.
These groups are already Use the same security tool Your company may use it solely to identify and exploit those vulnerabilities, or to incorporate them (in the case of XcodeGhost and its derivatives).
Safe as a home
The truth of security preparation today is that you are not thinking if Your security will be destroyed – you accept that it will probably be destroyed.Instead, think about what to do when Your security is compromised.
[Also read: 12 security tips for the ‘work from home’ enterprise]
That is, make plans to protect your system during and after an attack, make sure your staff are security conscious, and if an action you take puts your system at risk, your employees will be in front of you. It means ensuring that you develop a workplace culture that is fully supportive so that you are not afraid to move on.
Is the huge number of people affected by XcodeGhost revealing Apple’s security issues? In reality it is not. Because the attempt at that platform is constant and some people do it within that context. And, of course, when the problem was identified, Apple responded quickly.
That’s the right approach. We know that an attack will occur, and if it does occur, we need to take mitigation measures. One of Apple’s best ways to thwart such attacks is to manage the distribution through the App Store. It’s not perfect, but it works most of the time.
Preparation is better than treatment
We know the standard Peripheral security model no longer works.. We know that security incidents will occur. In short, it’s a good idea to make these events less likely to occur and to act decisively when they do occur.
Perhaps it was irresponsible that Apple didn’t reveal the number of people affected by the attack? I don’t think so because Apple has cleared this mess.
In this case, it is important to note that this exploit was not actually used for anything more malicious than the device fingerprint. However, this can have a terrifying impact on China.
So what’s the lesson here? As a result, attacks are becoming more sophisticated, targeted, and more dangerous. They are also becoming more expensive, which means that most people are less likely to be attacked – but if you are a company, NGO, or dissenting, you should be worried.
How to increase the security of your iOS device
Here are some steps you should always take to increase the security of your device:
- If you receive a new device, please update your OS.
- Always install security updates.
- Do not jailbreak your device.
- Enable automatic download of app updates.
- Enable remote wipe to encrypt device backups.
- Set a complex passcode to allow the device to erase data if the passcode is tried too many times.
- Turn off location services and disable lock screen access to the Control Center.
- Do not download the app unless you really need it.
- Regularly audit and remove unused apps.
- Set the app permissions to a minimum.
- If you are using Safari or any browser, enable fraud alerts, disable form autofill, block third-party cookies, and turn on Do Not Track.
- To mitigate network security issues, turn off AirDrop, Bluetooth, and personal hotspots when not in use and forget about your Wi-Fi network unless you’re completely trustworthy.
- Stay up to date with the latest security news related to your industry.
- read Apple Platform Security Guide..
Copyright © 2021 IDG Communications, Inc.
Enterprises need to be smart about iOS security
Source link Enterprises need to be smart about iOS security