Popular Chinese iOS apps compromised in unprecedented malware attack

What happened?

According to recent reports, some versions of Xcode used by developers in China have been compromised and are being used to inject tracking codes in iOS apps without developer knowledge. (1,2). Unaware of the injection, those developers then released their compromised iOS apps to the App Store which were then later approved by Apple. At the time of writing this post, the compromised apps are still available in the App store. Any user who has installed and launched these compromised apps will be a victim of these tracking codes.

This is a significant compromise of Apple’s app store. Apple notoriously manually reviews all app submissions and, in comparison to Android stores, has been relatively malware-free. This is the most widespread and significant spread of malware in the history of the Apple app store, anywhere in the world.

The compromised version of Xcode was hosted on Baidu Pan. It is unlikely that Baidu was aware of the compromised version of Xcode. The company removed the files yesterday when news of the compromise surfaced. Because of slow download speeds from foreign websites in China, many Chinese developers prefer to download apps from domestic websites. Many Chinese also use download software like Xunlei, rather than downloading directly from the official Mac App Store.

According to users reports, many prominent Chinese apps are affected. We have included links to the compromised apps in the list below but DO NOT DOWNLOAD these apps. We are simply linking to them so that users can recognize the apps. Affected apps include:  

Wechat The most popolar messaging app in China 

网易云音乐 (NetEase Cloud Music) - Netease free Spotify-type app

网易公开课 (NetEase) - open education app, used by many students

中信银行动卡空间 (China CITIC Bank Card Space)

中国联通手机营业厅 (China Unicom Shop)

滴滴出行 (DiDi travel) - the popular car sharing app

12306 - only train ticketing website

高德地图 (Auto-Navigation)

It is important to note that the two Netease apps are official apps from Netease. Netease is one of the biggest internet companies in China. Wechat is the most popular messaging app in China. China Unicom is one of China’s major telecom companies and CITIC is one of the country’s largest banks. These apps are likely to be extremely popular and highly trusted by users. It is extremely irresponsible for developers in those companies to ignore digital signature warnings and to continue to use compromised Xcode. If the malware author did a targeted attack against wechat or CITIC, he would have been able to gain users credentials, collect chat history, contact list or even banking details!

Netease has already posted a warning about its music app for users:

Wechat also acknowleged the problem. 

What can compromised users do to mitigate this attack?

If you are an iPhone user, there is little you can do. Do not download the above apps. Do not give permissions to apps unless absolutely necessary. Enable two-step verification for Apple ID. Even though this specific malware does not seem to target Apple IDs at this time, it is possible that in the future more aggressive malware will be used to display a fake window asking for sign-in credentials. According to paloaltonetworks, the current malware is affecting:

  • Current time

  • Current infected app name

  • The app bundle identifier

  • Current device name and type

  • Current system language and country

  • Current device UUID

  • Network type

 

If you are an iOS developer, however, a lot can be done to secure your development system:

  • Always download Xcode from the official Mac App Store. For other developer tools, always download these from official sources.

  • Always check the digital signature of developer tools. It is irresponsible for developers to ignore signature warnings. Xcode clearly should have been signed by Apple; all other versions should have produced user warnings.

  • Separate your development system with your everyday system. Development systems should be used solely for development and not for browsing random sites. If physical separation presents too much of a problem for developers, at the very least, a dedicated user account for development should be used.

What should Apple do to mitigate this compromise?

Apple should immediately scan their entire App Store to look for malware signatures and to remove all apps that are affected.

Apple’s Gatekeeper should implement a pre-loaded list of apps to enforce signature validation. For example, if Xcode and other crucial apps have invalid signatures, the OS should not allow users to bypass and proceed with installation. (This idea is similar to HSTS preload, in an effort to prevent network attacks.)

We have asked Apple to comment on their mitigation strategy in this instance and to outline their plans for future defense mechanisms to avoid a repeat of this situation.

Update: Apple scanned and took down infected apps in the App store and sent emails to urge developers to download Xcode from official sources.

Who is behind the attack and why would somebody create this compromise?

CoderFun first started to release compromised Xcode about 5 months ago.

 

It seems that this particular malware is being used to collect device information for data mining. However, the malware could have been used more aggressively to collect private information such as contacts, photos, and even iCloud passwords via phishing when combined with other evasion mechanisms to counter manual reviews.
 

References:

http://drops.wooyun.org/news/8864

http://weibo.com/1708947107/CAVdJ8Epo?from=page_1005051708947107_profile&wvr=6&mod=weibotime&type=comment#_rnd1442530292827

http://researchcenter.paloaltonetworks.com/2015/09/novel-malware-xcodeghost-modifies-xcode-infects-apple-ios-apps-and-hits-app-store/

 

Comments

More Blog Posts

Subscribe to our mailing list
Show content from Blog | Google+ | Twitter | All. Subscribe to our blog using RSS.

Thu, Aug 10, 2023

1.4 million people used FreeBrowser to circumvent the Great Firewall of Turkmenistan

Since 2021, the authorities in Turkmenistan have taken exceptional measures to crack down on the use of circumvention tools. Citizens have been forced to swear on the Koran that they will not use a VPN. Circumvention tool websites have been systematically blocked. Arbitrary searches of mobile devices have also taken place and have even targeted school children and teachers.

The government has also blocked servers hosting VPNs which led to “near complete” internet shutdowns on several occasions in 2022. Current reports indicate that 66 hosting providers, 19 social networks and messaging platforms, and 10 leading content delivery networks (CDNs), are blocked in the country. The government presumably is unconcerned about the negative economic impact that such shutdowns can cause.

Fri, Mar 18, 2022

Well-intentioned decisions have just made it easier for Putin to control the Russian Internet

This article is in large part inspired by a recent article from Meduza (in Russian).

Since the beginning of the war in Ukraine, Russian users have had problems accessing government websites and online banking clients. Browsers began to mark these sites as unsafe and drop the connection. The reason is the revocation of digital security certificates by foreign certificate authorities (either as a direct consequence of sanctions or as an independent, good will move); without them, browsers do not trust sites and “protect” their users from them.

However, these actions, caused - or at least triggered by - a desire to punish Russia for their gruesome actions in Ukraine, will have long-lasting consequences for Russian netizens.

Digital certificates are needed to confirm that the site the user wants to visit is not fraudulent. The certificates contain encryption keys to establish a secure connection between the site and the user. It is very easy to understand whether a page on the Internet is protected by a certificate. One need just look at the address bar of the browser. If the address begins with the https:// prefix, and there is a lock symbol next to the address, the page is protected. By clicking on this lock, you can see the status of the connection, the name of the Certification Authority (CA) that issued the certificate, and its validity period.

There are several dozen commercial and non-commercial organizations in the world that have digital root certificates, but 3/4 of all certificates are issued by only five of the largest companies. Four of them are registered in the USA and one is registered in Belgium.

Mon, Aug 03, 2020

Announcing the Release of GreatFire AppMaker

GreatFire (https://en.greatfire.org/), a China-focused censorship monitoring organization, is proud to announce that we have developed and released a new anti-censorship tool that will enable any blocked media outlet, blogger, human rights group, or civil society organization to evade censors and get their content onto the phones of millions of readers and supporters in China and other countries that censor the Internet.

GreatFire has built an Android mobile app creator, called “GreatFire AppMaker”, that can be used by organizations to unblock their content for users in China and other countries. Organizations can visit a website (https://appmaker.greatfire.org/) which will compile an app that is branded with the organization’s own logo and will feature their own, formerly blocked content. The app will also contain a special, censorship-circumventing web browser so that users can access the uncensored World Wide Web. The apps will use multiple strategies, including machine learning, to evade advanced censorship tactics employed by the Chinese authorities.  This project will work equally well in other countries that have China-like censorship restrictions. For both organizations and end users, the apps will be free, fast, and extremely easy to use.

This project was inspired by China-based GreatFire’s first-hand experience with our own FreeBrowser app (https://freebrowser.org/en) and desire to help small NGOs who may not have the in-house expertise to circumvent Chinese censorship. GreatFire’s anti-censorship tools have worked in China when others do not. FreeBrowser directs Chinese internet users to normally censored stories from the app’s start page (http://manyvoices.news/).

Fri, Jul 24, 2020

Apple, anticompetition, and censorship

On July 20, 2020, GreatFire wrote to all 13 members of the Subcommittee on Antitrust, Commercial and Administrative Law of the U.S. House Committee on the Judiciary, requesting a thorough examination into Apple’s practice of censorship of its App Store, and an investigation into how the company collaborates with the Chinese authorities to maintain its unique position as one of the few foreign tech companies operating profitably in the Chinese digital market.  

This letter was sent a week before Apple CEO TIm Cook will be called for questioning in front of the Subcommittee on Antitrust, Commercial and Administrative Law. The CEOs of Amazon, Google and Facebook will also be questioned on July 27, as part of the Committee’s ongoing investigation into competition in the digital marketplace.

This hearing offers an opportunity to detail to the Subcommittee how Apple uses its closed operating ecosystem to not only abuse its market position but also to deprive certain users, most notably those in China, of their right to download and use apps related to privacy, secure communication, and censorship circumvention.

We hope that U.S. House representatives agree with our view that Apple should not be allowed to do elsewhere what would be considered as unacceptable in the U.S. Chinese citizens are not second class citizens. Private companies such as Apple compromise themselves and their self-proclaimed values of freedom and privacy when they collaborate with the Chinese government and its censors.

Mon, Jun 10, 2019

Apple Censoring Tibetan Information in China

Apple has a long history of censorship when it comes to information about Tibet. In 2009, it was revealed that several apps related to the Dalai Lama were not available in the China App Store. The developers of these apps were not notified that their apps were removed. When confronted with these instances of censorship, an Apple spokesperson simply said that the company “continues to comply with local laws”.

In December, 2017, at a conference in China, when asked about working with the Chinese authorities to censor the Apple App Store, Tim Cook proclaimed:

"Your choice is: do you participate, or do you stand on the sideline and yell at how things should be. And my own view very strongly is you show up and you participate, you get in the arena because nothing ever changes from the sideline."

In the ten years since Apple was first criticized for working with the Chinese authorities to silence already marginalized voices, what has changed? Apple continues to strictly follow the censorship orders of the Chinese authorities. When does Tim Cook expect that his company will help to bring about positive change in China?

Based on data generated from https://applecensorship.com, Apple has now censored 29 popular Tibetan mobile applications in the China App Store. Tibetan-themed apps dealing with news, religious study, tourism, and even games are being censored by Apple. A full list of the censored apps appear below.

Subscribe to our blog using RSS.

Comments

Really no matter if someone doesn't understand after that its
up to other users that they will assist, so here it
takes place. http://goo.gl/ZveCle

terima kasih atas informasinya, dan salam sehat.
http://bit.do/b2Y7M

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/WGsWq9

Hi there, I found your site by the use of Google at
the same time as looking for a comparable topic, your website
came up, it appears to be like great. I've bookmarked it in my google bookmarks.
http://bit.ly/1ToGXL8

terima kasih atas informasinya, dan salam sehat.
http://bit.do/b2Zny

terima kasih atas informasinya, dan salam sehat.
http://ow.ly/5IYP300m5rZ

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/C3IpQw

terima kasih atas informasinya, dan salam sehat.
http://bit.do/b26NV

terima kasih atas informasinya, dan salam sehat.
http://obatstrokepalingmanjur66.mkes.info/

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/RtWrdE

thank's for the information, i'm very happy to visit your website
http://goo.gl/cVXWdF

terima kasih atas informasinya, dan salam sehat.
http://mysp.ac/3Vutq

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/YTyupy

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/E80Uk9

terima kasih atas informasinya, dan salam sehat.
http://obatalamiinfeksisalurankemih66.mkes.info/

terimakasih informasinya gan, sukses terus buat informasinya
http://goo.gl/o6SWNX

terima kasih atas informasinya, dan salam sehat.
http://obattradisionalvarises77.mkes.info/

thank for the information, succesfull and healthy always
http://zon9.xyz/BhSPz

thank for the information, succesfull and healthy always
http://ow.ly/5tFA300sTn8

terima kasih atas informasinya, dan salam sehat.
http://obathidrokel99.mkes.info/

terimakasih informasinya gan, sukses terus buat informasinya
http://goo.gl/W3b4MU

terimakasih informasinya gan, sukses terus buat informasinya
http://goo.gl/a6W8A1

Really very interesting post about malware attack and I will use them for saving my apps. And I am also planning to share useful content like this post on my blog - Topindiafree.com

terimakasih informasinya gan, sukses terus buat informasinya
http://goo.gl/g6AaXt

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/cdstXZ

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/FSTeGC

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/4yRVLE

terima kasih atas informasinya, dan salam sehat.
http://ow.ly/pIcP300FM3Y

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/RGzna

terima kasih atas informasinya, dan salam sehat.
http://t.co/gCM3NF7htJ

terimakasih atas informasinya gan, sukses terus buat informasinya http://goo.gl/gKR5Po

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/zA9Fu

terima kasih atas informasinya, dan salam sehat.
http://ow.ly/Kdrd300HXN2

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/uNNrVu

terima kasih atas informasinya, dan salam sehat.
http://bit.ly/1OX51AA

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/Jbe2P

terima kasih atas informasinya, dan salam sehat.
http://bit.ly/1VreAi6

terimakasih informasinya gan, sukses terus buat informasinya
http://goo.gl/fIe8si

terima kasih atas informasinya, dan salam sehat.
http://obatginjalbocor035.mkes.info/

terimakasih atas informasinya gan, sukses terus dan sehat selalu
http://goo.gl/JaJWQw

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/gsFkQ

terima kasih atas informasinya, dan salam sehat.
http://bit.ly/1Z9F1b6

terimakasih informasinya gan, sukses terus buat informasinya
http://goo.gl/6NNVTq

terima kasih atas informasinya, dan salam sehat.
http://bit.do/b4fQC

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/mkXKcy

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/FmFnaz

terimakasih informasinya gan, sukses terus buat informasinya
http://goo.gl/90PDGM

Terimakasih atas informasinya gan, sukses terus buat informasinya
http://goo.gl/pMgF1Z

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/7GBJHQ

Thanks for the information very interesting I really liked all the writing you. I make sure your blog is becoming one of my favorite blogs to read. I will visit again
Obat Pemutih Wajah Alami

Pages

Add new comment

Filtered HTML

  • Web page addresses and e-mail addresses turn into links automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <blockquote> <code> <ul> <ol> <li> <dl> <dt> <dd>
  • Lines and paragraphs break automatically.

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
By submitting this form, you accept the Mollom privacy policy.