Popular Chinese iOS apps compromised in unprecedented malware attack

What happened?

According to recent reports, some versions of Xcode used by developers in China have been compromised and are being used to inject tracking codes in iOS apps without developer knowledge. (1,2). Unaware of the injection, those developers then released their compromised iOS apps to the App Store which were then later approved by Apple. At the time of writing this post, the compromised apps are still available in the App store. Any user who has installed and launched these compromised apps will be a victim of these tracking codes.

This is a significant compromise of Apple’s app store. Apple notoriously manually reviews all app submissions and, in comparison to Android stores, has been relatively malware-free. This is the most widespread and significant spread of malware in the history of the Apple app store, anywhere in the world.

The compromised version of Xcode was hosted on Baidu Pan. It is unlikely that Baidu was aware of the compromised version of Xcode. The company removed the files yesterday when news of the compromise surfaced. Because of slow download speeds from foreign websites in China, many Chinese developers prefer to download apps from domestic websites. Many Chinese also use download software like Xunlei, rather than downloading directly from the official Mac App Store.

According to users reports, many prominent Chinese apps are affected. We have included links to the compromised apps in the list below but DO NOT DOWNLOAD these apps. We are simply linking to them so that users can recognize the apps. Affected apps include:  

Wechat The most popolar messaging app in China 

网易云音乐 (NetEase Cloud Music) - Netease free Spotify-type app

网易公开课 (NetEase) - open education app, used by many students

中信银行动卡空间 (China CITIC Bank Card Space)

中国联通手机营业厅 (China Unicom Shop)

滴滴出行 (DiDi travel) - the popular car sharing app

12306 - only train ticketing website

高德地图 (Auto-Navigation)

It is important to note that the two Netease apps are official apps from Netease. Netease is one of the biggest internet companies in China. Wechat is the most popular messaging app in China. China Unicom is one of China’s major telecom companies and CITIC is one of the country’s largest banks. These apps are likely to be extremely popular and highly trusted by users. It is extremely irresponsible for developers in those companies to ignore digital signature warnings and to continue to use compromised Xcode. If the malware author did a targeted attack against wechat or CITIC, he would have been able to gain users credentials, collect chat history, contact list or even banking details!

Netease has already posted a warning about its music app for users:

Wechat also acknowleged the problem. 

What can compromised users do to mitigate this attack?

If you are an iPhone user, there is little you can do. Do not download the above apps. Do not give permissions to apps unless absolutely necessary. Enable two-step verification for Apple ID. Even though this specific malware does not seem to target Apple IDs at this time, it is possible that in the future more aggressive malware will be used to display a fake window asking for sign-in credentials. According to paloaltonetworks, the current malware is affecting:

  • Current time

  • Current infected app name

  • The app bundle identifier

  • Current device name and type

  • Current system language and country

  • Current device UUID

  • Network type

 

If you are an iOS developer, however, a lot can be done to secure your development system:

  • Always download Xcode from the official Mac App Store. For other developer tools, always download these from official sources.

  • Always check the digital signature of developer tools. It is irresponsible for developers to ignore signature warnings. Xcode clearly should have been signed by Apple; all other versions should have produced user warnings.

  • Separate your development system with your everyday system. Development systems should be used solely for development and not for browsing random sites. If physical separation presents too much of a problem for developers, at the very least, a dedicated user account for development should be used.

What should Apple do to mitigate this compromise?

Apple should immediately scan their entire App Store to look for malware signatures and to remove all apps that are affected.

Apple’s Gatekeeper should implement a pre-loaded list of apps to enforce signature validation. For example, if Xcode and other crucial apps have invalid signatures, the OS should not allow users to bypass and proceed with installation. (This idea is similar to HSTS preload, in an effort to prevent network attacks.)

We have asked Apple to comment on their mitigation strategy in this instance and to outline their plans for future defense mechanisms to avoid a repeat of this situation.

Update: Apple scanned and took down infected apps in the App store and sent emails to urge developers to download Xcode from official sources.

Who is behind the attack and why would somebody create this compromise?

CoderFun first started to release compromised Xcode about 5 months ago.

 

It seems that this particular malware is being used to collect device information for data mining. However, the malware could have been used more aggressively to collect private information such as contacts, photos, and even iCloud passwords via phishing when combined with other evasion mechanisms to counter manual reviews.
 

References:

http://drops.wooyun.org/news/8864

http://weibo.com/1708947107/CAVdJ8Epo?from=page_1005051708947107_profile&wvr=6&mod=weibotime&type=comment#_rnd1442530292827

http://researchcenter.paloaltonetworks.com/2015/09/novel-malware-xcodeghost-modifies-xcode-infects-apple-ios-apps-and-hits-app-store/

 

Comments

More Blog Posts

Subscribe to our mailing list
Show content from Blog | Google+ | Twitter | All. Subscribe to our blog using RSS.

Mon, Nov 25, 2024

China’s New Effort to Achieve Cyber Sovereignty

How Real-Name Registration policies create an “ideological firewall” that chills dissent by eliminating user anonymity and selectively restricting transnational access to Chinese social media apps.

Thu, Aug 10, 2023

1.4 million people used FreeBrowser to circumvent the Great Firewall of Turkmenistan

Since 2021, the authorities in Turkmenistan have taken exceptional measures to crack down on the use of circumvention tools. Citizens have been forced to swear on the Koran that they will not use a VPN. Circumvention tool websites have been systematically blocked. Arbitrary searches of mobile devices have also taken place and have even targeted school children and teachers.

The government has also blocked servers hosting VPNs which led to “near complete” internet shutdowns on several occasions in 2022. Current reports indicate that 66 hosting providers, 19 social networks and messaging platforms, and 10 leading content delivery networks (CDNs), are blocked in the country. The government presumably is unconcerned about the negative economic impact that such shutdowns can cause.

Fri, Mar 18, 2022

Well-intentioned decisions have just made it easier for Putin to control the Russian Internet

This article is in large part inspired by a recent article from Meduza (in Russian).

Since the beginning of the war in Ukraine, Russian users have had problems accessing government websites and online banking clients. Browsers began to mark these sites as unsafe and drop the connection. The reason is the revocation of digital security certificates by foreign certificate authorities (either as a direct consequence of sanctions or as an independent, good will move); without them, browsers do not trust sites and “protect” their users from them.

However, these actions, caused - or at least triggered by - a desire to punish Russia for their gruesome actions in Ukraine, will have long-lasting consequences for Russian netizens.

Digital certificates are needed to confirm that the site the user wants to visit is not fraudulent. The certificates contain encryption keys to establish a secure connection between the site and the user. It is very easy to understand whether a page on the Internet is protected by a certificate. One need just look at the address bar of the browser. If the address begins with the https:// prefix, and there is a lock symbol next to the address, the page is protected. By clicking on this lock, you can see the status of the connection, the name of the Certification Authority (CA) that issued the certificate, and its validity period.

There are several dozen commercial and non-commercial organizations in the world that have digital root certificates, but 3/4 of all certificates are issued by only five of the largest companies. Four of them are registered in the USA and one is registered in Belgium.

Mon, Aug 03, 2020

Announcing the Release of GreatFire AppMaker

GreatFire (https://en.greatfire.org/), a China-focused censorship monitoring organization, is proud to announce that we have developed and released a new anti-censorship tool that will enable any blocked media outlet, blogger, human rights group, or civil society organization to evade censors and get their content onto the phones of millions of readers and supporters in China and other countries that censor the Internet.

GreatFire has built an Android mobile app creator, called “GreatFire AppMaker”, that can be used by organizations to unblock their content for users in China and other countries. Organizations can visit a website (https://appmaker.greatfire.org/) which will compile an app that is branded with the organization’s own logo and will feature their own, formerly blocked content. The app will also contain a special, censorship-circumventing web browser so that users can access the uncensored World Wide Web. The apps will use multiple strategies, including machine learning, to evade advanced censorship tactics employed by the Chinese authorities.  This project will work equally well in other countries that have China-like censorship restrictions. For both organizations and end users, the apps will be free, fast, and extremely easy to use.

This project was inspired by China-based GreatFire’s first-hand experience with our own FreeBrowser app (https://freebrowser.org/en) and desire to help small NGOs who may not have the in-house expertise to circumvent Chinese censorship. GreatFire’s anti-censorship tools have worked in China when others do not. FreeBrowser directs Chinese internet users to normally censored stories from the app’s start page (http://manyvoices.news/).

Fri, Jul 24, 2020

Apple, anticompetition, and censorship

On July 20, 2020, GreatFire wrote to all 13 members of the Subcommittee on Antitrust, Commercial and Administrative Law of the U.S. House Committee on the Judiciary, requesting a thorough examination into Apple’s practice of censorship of its App Store, and an investigation into how the company collaborates with the Chinese authorities to maintain its unique position as one of the few foreign tech companies operating profitably in the Chinese digital market.  

This letter was sent a week before Apple CEO TIm Cook will be called for questioning in front of the Subcommittee on Antitrust, Commercial and Administrative Law. The CEOs of Amazon, Google and Facebook will also be questioned on July 27, as part of the Committee’s ongoing investigation into competition in the digital marketplace.

This hearing offers an opportunity to detail to the Subcommittee how Apple uses its closed operating ecosystem to not only abuse its market position but also to deprive certain users, most notably those in China, of their right to download and use apps related to privacy, secure communication, and censorship circumvention.

We hope that U.S. House representatives agree with our view that Apple should not be allowed to do elsewhere what would be considered as unacceptable in the U.S. Chinese citizens are not second class citizens. Private companies such as Apple compromise themselves and their self-proclaimed values of freedom and privacy when they collaborate with the Chinese government and its censors.

Subscribe to our blog using RSS.

Comments

Thanks to the advent of technology, high quality http://www.essay-writing.co.uk/ and affordable educational assignment help websites like us.

terimakasih atas informasinya, dan salam sehat.
http://ow.ly/10yhRE

terimakasih atas informasinya, dan salam sehat.
http://bit.ly/1YqDi0b

terimakasih atas informasinya, dan salam sehat.
http://tinyurl.com/q8onqak

terimakasih atas informasinya, dan salam sehat.
http://goo.gl/evZWWY

Terimakasih informasinya gan
http://url.ie/zfmx

terimakasih atas informasinya, dan salam sehat.
http://tiny.cc/81jqay

terimakasih atas informasinya, dan salam sehat.
http://goo.gl/dPaHyd

terimakasih atas informasinya gan http://url.ie/zfof

terimakasih atas informasinya, dan salam sehat.
http://goo.gl/apNgaF

terimakasih atas informasinya, dan salam sehat.
http://ow.ly/10yLaA

terimakasih atas informasinya, dan salam sehat.
http://ow.ly/10yNNy

terimakasih atas informasinya, dan salam sehat.
http://ow.ly/10yW0F

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/OfS6PH

terimakasih atas informasinya, dan salam sehat.
http://obatparuparubasahalami66.blogspot.com

terimakasih atas informasinya gan
http://goo.gl/7pShpH

terimakasih atas informasinya, dan salam sehat.
http://obatsesaknafasalami55.blogspot.com

terimakasih informasinya gan sukses terus dan sehat selalu
http://pemutihkulit.dkes.org/

terimakasih informasinya gan sukses terus dan sehat selalu
http://pemutihkulit.dkes.org/

We're Lucky to have a website like this for sarkari result as I am preparing for the government jobs exams in India. Thanks a million for maintaining the unique and rare content which is also helping me prepare for the exams.

terimakasih informasinya gan sukses terus dan sehat selalu
http://zon9.xyz/sziiu

terimakasih atas informasinya gan http://url.ie/zgwj

terimakasih atas informasinya, dan salam sehat.
http://obatayanalami55.blogspot.com/

terimakasih atas informasinya, dan salam sehat.
http://bit.do/bWGYv

terimakasih atas informasinya, dan salam sehat.
http://bit.do/bWTRP

terimakasih atas informasinya, dan salam sehat.
http://bit.do/bWTUJ

terimakasih atas informasinya, dan salam sehat.
http://ow.ly/4n0uT2

terimakasih atas informasinya, dan salam sehat.
http://bit.do/bWT2i

terimakasih atas informasinya, dan salam sehat.
http://tiny.cc/79b0ay

terimakasih atas informasinya, dan salam sehat.
http://tiny.cc/e1d0ay

Thank you for the information, and healthy greetings.
http://tiny.cc/bge0ay

terimakasih atas informasinya, dan salam sehat.
http://tiny.cc/1ye0ay

terimakasih atas informasinya, dan salam sehat.
http://goo.gl/HYRWom

terimakasih atas informasinya, dan salam sehat.
http://tiny.cc/0rm1ay

terimakasih atas informasinya, dan salam sehat.
http://goo.gl/YjU72y

terimakasih atas informasinya, dan salam sehat.
http://tiny.cc/5ho1ay

terimakasih atas informasinya, dan salam sehat.
http://tiny.cc/48o1ay

terimakasih atas informasinya, dan salam sehat.
http://tiny.cc/12q1ay

terimakasih atas informasinya, dan salam sehat.
http://tiny.cc/5nr1ay

terimakasih atas informasinya, dan salam sehat.
http://tiny.cc/29r1ay

terimakasih atas informasinya, dan salam sehat.
http://goo.gl/uO7CDE

terimakasih atas informasinya, dan salam sehat.
http://goo.gl/1LZZQZ

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/vYAdES

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/HHYY0f

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/9g93u6

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/xvqNQ2

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/WBGC2t

terima kasih atas informasinya, dan salam sehat.
http://tiny.cc/h0g2ay

terimakasih atas informasinya, dan salam sehat.
http://goo.gl/09E8Lj

terimakasih atas informasinya, dan salam sehat.
http://goo.gl/UgbkMY

Pages

Add new comment

Filtered HTML

  • Web page addresses and e-mail addresses turn into links automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <blockquote> <code> <ul> <ol> <li> <dl> <dt> <dd>
  • Lines and paragraphs break automatically.

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
By submitting this form, you accept the Mollom privacy policy.