Popular Chinese iOS apps compromised in unprecedented malware attack

What happened?

According to recent reports, some versions of Xcode used by developers in China have been compromised and are being used to inject tracking codes in iOS apps without developer knowledge. (1,2). Unaware of the injection, those developers then released their compromised iOS apps to the App Store which were then later approved by Apple. At the time of writing this post, the compromised apps are still available in the App store. Any user who has installed and launched these compromised apps will be a victim of these tracking codes.

This is a significant compromise of Apple’s app store. Apple notoriously manually reviews all app submissions and, in comparison to Android stores, has been relatively malware-free. This is the most widespread and significant spread of malware in the history of the Apple app store, anywhere in the world.

The compromised version of Xcode was hosted on Baidu Pan. It is unlikely that Baidu was aware of the compromised version of Xcode. The company removed the files yesterday when news of the compromise surfaced. Because of slow download speeds from foreign websites in China, many Chinese developers prefer to download apps from domestic websites. Many Chinese also use download software like Xunlei, rather than downloading directly from the official Mac App Store.

According to users reports, many prominent Chinese apps are affected. We have included links to the compromised apps in the list below but DO NOT DOWNLOAD these apps. We are simply linking to them so that users can recognize the apps. Affected apps include:  

Wechat The most popolar messaging app in China 

网易云音乐 (NetEase Cloud Music) - Netease free Spotify-type app

网易公开课 (NetEase) - open education app, used by many students

中信银行动卡空间 (China CITIC Bank Card Space)

中国联通手机营业厅 (China Unicom Shop)

滴滴出行 (DiDi travel) - the popular car sharing app

12306 - only train ticketing website

高德地图 (Auto-Navigation)

It is important to note that the two Netease apps are official apps from Netease. Netease is one of the biggest internet companies in China. Wechat is the most popular messaging app in China. China Unicom is one of China’s major telecom companies and CITIC is one of the country’s largest banks. These apps are likely to be extremely popular and highly trusted by users. It is extremely irresponsible for developers in those companies to ignore digital signature warnings and to continue to use compromised Xcode. If the malware author did a targeted attack against wechat or CITIC, he would have been able to gain users credentials, collect chat history, contact list or even banking details!

Netease has already posted a warning about its music app for users:

Wechat also acknowleged the problem. 

What can compromised users do to mitigate this attack?

If you are an iPhone user, there is little you can do. Do not download the above apps. Do not give permissions to apps unless absolutely necessary. Enable two-step verification for Apple ID. Even though this specific malware does not seem to target Apple IDs at this time, it is possible that in the future more aggressive malware will be used to display a fake window asking for sign-in credentials. According to paloaltonetworks, the current malware is affecting:

  • Current time

  • Current infected app name

  • The app bundle identifier

  • Current device name and type

  • Current system language and country

  • Current device UUID

  • Network type

 

If you are an iOS developer, however, a lot can be done to secure your development system:

  • Always download Xcode from the official Mac App Store. For other developer tools, always download these from official sources.

  • Always check the digital signature of developer tools. It is irresponsible for developers to ignore signature warnings. Xcode clearly should have been signed by Apple; all other versions should have produced user warnings.

  • Separate your development system with your everyday system. Development systems should be used solely for development and not for browsing random sites. If physical separation presents too much of a problem for developers, at the very least, a dedicated user account for development should be used.

What should Apple do to mitigate this compromise?

Apple should immediately scan their entire App Store to look for malware signatures and to remove all apps that are affected.

Apple’s Gatekeeper should implement a pre-loaded list of apps to enforce signature validation. For example, if Xcode and other crucial apps have invalid signatures, the OS should not allow users to bypass and proceed with installation. (This idea is similar to HSTS preload, in an effort to prevent network attacks.)

We have asked Apple to comment on their mitigation strategy in this instance and to outline their plans for future defense mechanisms to avoid a repeat of this situation.

Update: Apple scanned and took down infected apps in the App store and sent emails to urge developers to download Xcode from official sources.

Who is behind the attack and why would somebody create this compromise?

CoderFun first started to release compromised Xcode about 5 months ago.

 

It seems that this particular malware is being used to collect device information for data mining. However, the malware could have been used more aggressively to collect private information such as contacts, photos, and even iCloud passwords via phishing when combined with other evasion mechanisms to counter manual reviews.
 

References:

http://drops.wooyun.org/news/8864

http://weibo.com/1708947107/CAVdJ8Epo?from=page_1005051708947107_profile&wvr=6&mod=weibotime&type=comment#_rnd1442530292827

http://researchcenter.paloaltonetworks.com/2015/09/novel-malware-xcodeghost-modifies-xcode-infects-apple-ios-apps-and-hits-app-store/

 

Comments

More Blog Posts

Subscribe to our mailing list
Show content from Blog | Google+ | Twitter | All. Subscribe to our blog using RSS.

Thu, Aug 10, 2023

1.4 million people used FreeBrowser to circumvent the Great Firewall of Turkmenistan

Since 2021, the authorities in Turkmenistan have taken exceptional measures to crack down on the use of circumvention tools. Citizens have been forced to swear on the Koran that they will not use a VPN. Circumvention tool websites have been systematically blocked. Arbitrary searches of mobile devices have also taken place and have even targeted school children and teachers.

The government has also blocked servers hosting VPNs which led to “near complete” internet shutdowns on several occasions in 2022. Current reports indicate that 66 hosting providers, 19 social networks and messaging platforms, and 10 leading content delivery networks (CDNs), are blocked in the country. The government presumably is unconcerned about the negative economic impact that such shutdowns can cause.

Fri, Mar 18, 2022

Well-intentioned decisions have just made it easier for Putin to control the Russian Internet

This article is in large part inspired by a recent article from Meduza (in Russian).

Since the beginning of the war in Ukraine, Russian users have had problems accessing government websites and online banking clients. Browsers began to mark these sites as unsafe and drop the connection. The reason is the revocation of digital security certificates by foreign certificate authorities (either as a direct consequence of sanctions or as an independent, good will move); without them, browsers do not trust sites and “protect” their users from them.

However, these actions, caused - or at least triggered by - a desire to punish Russia for their gruesome actions in Ukraine, will have long-lasting consequences for Russian netizens.

Digital certificates are needed to confirm that the site the user wants to visit is not fraudulent. The certificates contain encryption keys to establish a secure connection between the site and the user. It is very easy to understand whether a page on the Internet is protected by a certificate. One need just look at the address bar of the browser. If the address begins with the https:// prefix, and there is a lock symbol next to the address, the page is protected. By clicking on this lock, you can see the status of the connection, the name of the Certification Authority (CA) that issued the certificate, and its validity period.

There are several dozen commercial and non-commercial organizations in the world that have digital root certificates, but 3/4 of all certificates are issued by only five of the largest companies. Four of them are registered in the USA and one is registered in Belgium.

Mon, Aug 03, 2020

Announcing the Release of GreatFire AppMaker

GreatFire (https://en.greatfire.org/), a China-focused censorship monitoring organization, is proud to announce that we have developed and released a new anti-censorship tool that will enable any blocked media outlet, blogger, human rights group, or civil society organization to evade censors and get their content onto the phones of millions of readers and supporters in China and other countries that censor the Internet.

GreatFire has built an Android mobile app creator, called “GreatFire AppMaker”, that can be used by organizations to unblock their content for users in China and other countries. Organizations can visit a website (https://appmaker.greatfire.org/) which will compile an app that is branded with the organization’s own logo and will feature their own, formerly blocked content. The app will also contain a special, censorship-circumventing web browser so that users can access the uncensored World Wide Web. The apps will use multiple strategies, including machine learning, to evade advanced censorship tactics employed by the Chinese authorities.  This project will work equally well in other countries that have China-like censorship restrictions. For both organizations and end users, the apps will be free, fast, and extremely easy to use.

This project was inspired by China-based GreatFire’s first-hand experience with our own FreeBrowser app (https://freebrowser.org/en) and desire to help small NGOs who may not have the in-house expertise to circumvent Chinese censorship. GreatFire’s anti-censorship tools have worked in China when others do not. FreeBrowser directs Chinese internet users to normally censored stories from the app’s start page (http://manyvoices.news/).

Fri, Jul 24, 2020

Apple, anticompetition, and censorship

On July 20, 2020, GreatFire wrote to all 13 members of the Subcommittee on Antitrust, Commercial and Administrative Law of the U.S. House Committee on the Judiciary, requesting a thorough examination into Apple’s practice of censorship of its App Store, and an investigation into how the company collaborates with the Chinese authorities to maintain its unique position as one of the few foreign tech companies operating profitably in the Chinese digital market.  

This letter was sent a week before Apple CEO TIm Cook will be called for questioning in front of the Subcommittee on Antitrust, Commercial and Administrative Law. The CEOs of Amazon, Google and Facebook will also be questioned on July 27, as part of the Committee’s ongoing investigation into competition in the digital marketplace.

This hearing offers an opportunity to detail to the Subcommittee how Apple uses its closed operating ecosystem to not only abuse its market position but also to deprive certain users, most notably those in China, of their right to download and use apps related to privacy, secure communication, and censorship circumvention.

We hope that U.S. House representatives agree with our view that Apple should not be allowed to do elsewhere what would be considered as unacceptable in the U.S. Chinese citizens are not second class citizens. Private companies such as Apple compromise themselves and their self-proclaimed values of freedom and privacy when they collaborate with the Chinese government and its censors.

Mon, Jun 10, 2019

Apple Censoring Tibetan Information in China

Apple has a long history of censorship when it comes to information about Tibet. In 2009, it was revealed that several apps related to the Dalai Lama were not available in the China App Store. The developers of these apps were not notified that their apps were removed. When confronted with these instances of censorship, an Apple spokesperson simply said that the company “continues to comply with local laws”.

In December, 2017, at a conference in China, when asked about working with the Chinese authorities to censor the Apple App Store, Tim Cook proclaimed:

"Your choice is: do you participate, or do you stand on the sideline and yell at how things should be. And my own view very strongly is you show up and you participate, you get in the arena because nothing ever changes from the sideline."

In the ten years since Apple was first criticized for working with the Chinese authorities to silence already marginalized voices, what has changed? Apple continues to strictly follow the censorship orders of the Chinese authorities. When does Tim Cook expect that his company will help to bring about positive change in China?

Based on data generated from https://applecensorship.com, Apple has now censored 29 popular Tibetan mobile applications in the China App Store. Tibetan-themed apps dealing with news, religious study, tourism, and even games are being censored by Apple. A full list of the censored apps appear below.

Subscribe to our blog using RSS.

Comments

thank forthe information
http://ow.ly/4nozuf

terimakasih informasinya gan
http://ow.ly/4noHxV

thank for the information, i'm really heppy visit to your website
http://ow.ly/4noXwA

terimakasih atas informasinya, dan salam sehat.
http://goo.gl/uI2lWG

Saya sangat senang bisa berkunjung ke website anda, informasi yang disajikan juga sangat bermanfaat. Jangan lupa kunjungi juga http://goo.gl/D1VUeA

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/PqkK6o

terima kasih atas informasinya, dan salam sehat.
http://bit.ly/1SO26zi

terima kasih atas informasinya, dan salam sehat.
http://bit.ly/1rWjyYJ

Terimakasih atas informasinya gan, informasi yang di sampaikan sangat bagus dan menarik http://ow.ly/4nrqr5

terima kasih atas informasinya, dan salam sehat.
http://bit.ly/23qOThx

terima kasih atas informasinya, dan salam sehat.
http://tinyurl.com/jbyumhp

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/zyiPR

thank for the information, the information is very good
http://ow.ly/4nrCtQ

terima kasih atas informasinya, dan salam sehat.
http://tiny.cc/3h79ay

terima kasih atas informasinya, dan salam sehat.
http://bit.do/bZBWq

terimakasih informasinya gan, sukses terus buat informasinya
http://obatparuparubasah.dkes.org

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/wytZK

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/Oiyc6h

terima kasih atas informasinya, dan salam sehat.
http://tiny.cc/eyyaby

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/PGiKhu

thank for the information, your information is very good, i'm very happy visit to your website http://jellygamat.dkes.org

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/9SrnLm

terima kasih atas informasinya, dan salam sehat.
http://obatkelenjartiroid.mkes.info/

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/L2ECd

thank for the information, succesfull and healthy always
http://ow.ly/PBra3000jyb

thank for the information, successful and healthy always
http://url.ie/zk3u

thank for the information, your information is very nice
http://goo.gl/87QlOz

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/kDGxe

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/7H6RLH

thank for the information, succesfull and healthy always
http://goo.gl/jpyX2l

thank for the information, succesfull and healthy always
http://ow.ly/kod73001WuX

terima kasih ataS informasinya, dan salam sehat.
http://bit.ly/24Fwtj0

terimakasih atas informasinya gan
http://goo.gl/YAqD9I

thank for the information, i'm very happy visit to your website
http://ow.ly/cZ3y3003VqU

terima kasih atas informasinya, dan salam sehat.
http://bit.ly/1T2H6Bq

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/zsiH3

thank for the information, succesfull and healthy always
http://ow.ly/c7O130049bC

Your blog provided us with valuable information to work with. Each & every tips of your post are awesome. Thanks a lot for sharing.Visit this page FuGoMo Entertainment Blog for new movie release, upcoming trailer, story line etc.

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/OCZIs

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/AwJfa

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/xvqum

thank for the information, succesfull and healthy always
http://t.co/Fm2J2tvoYC

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/eINP4

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/bfWeI

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/JT77W

thank for the information, i'm very happy visit to your website
http://t.co/AkL9qgb8U5

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/NZMMY

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/eT9WY

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/6u7Pr

Pages

Add new comment

Filtered HTML

  • Web page addresses and e-mail addresses turn into links automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <blockquote> <code> <ul> <ol> <li> <dl> <dt> <dd>
  • Lines and paragraphs break automatically.

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
By submitting this form, you accept the Mollom privacy policy.