Feeds

Reddit users discover iOS malware threat

'Unflod Baby Panda' looks to snatch Apple IDs

Beginner's guide to SSL certificates

Users on a mobile phone hacking subreddit are being credited with the discovery of a malware infection targeting iOS users.

The r/jailbreak community uncovered the infection while assisting a user who had been noticing unusual activity on his jailbroken iPhone.

Known as 'Unflod Baby Panda', the infection targets jailbroken iOS handsets and is believed to be spreading through Chinese iOS software sites. According to researchers at German security firm SektionEins, the malware listens in to SSL traffic on the infected handsets and looks to steal Apple ID information.

The researchers believe that the stolen credentials are being sent to servers which are controlled by individuals in China.

While manual removal of the malware is possible, SektionEins notes that Unflod Baby Panda could be putting additional files on infected handsets which have yet to be discovered.

"Currently the jailbreak community believes that deleting the Unfold.dylib binary and changing the apple-id's password afterwards is enough to recover from this attack. However it is still unknown how the dynamic library ends up on the device in the first place and therefore it is also unknown if it comes with additional malware gifts," the researchers wrote in an analysis of the infection.

"We therefore believe that the only safe way of removal is a full restore, which means the removal and loss of the jailbreak."

Because the malware requires the victim's handset to be jailbroken in order to be installed, most iPhone owners are not vulnerable to the infection. The malware has not been spotted on any apps offered through the Apple iOS App Store.

Malware on iOS devices has largely been a non-issue, thanks to Apple's tight control of the App Store approval process, which lets the company spot and disable potential malware threats. Users who jailbreak their handsets, however, do run the risk of infection should they install software from untrusted sources. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.