Popular Chinese iOS apps compromised in unprecedented malware attack

What happened?

According to recent reports, some versions of Xcode used by developers in China have been compromised and are being used to inject tracking codes in iOS apps without developer knowledge. (1,2). Unaware of the injection, those developers then released their compromised iOS apps to the App Store which were then later approved by Apple. At the time of writing this post, the compromised apps are still available in the App store. Any user who has installed and launched these compromised apps will be a victim of these tracking codes.

This is a significant compromise of Apple’s app store. Apple notoriously manually reviews all app submissions and, in comparison to Android stores, has been relatively malware-free. This is the most widespread and significant spread of malware in the history of the Apple app store, anywhere in the world.

The compromised version of Xcode was hosted on Baidu Pan. It is unlikely that Baidu was aware of the compromised version of Xcode. The company removed the files yesterday when news of the compromise surfaced. Because of slow download speeds from foreign websites in China, many Chinese developers prefer to download apps from domestic websites. Many Chinese also use download software like Xunlei, rather than downloading directly from the official Mac App Store.

According to users reports, many prominent Chinese apps are affected. We have included links to the compromised apps in the list below but DO NOT DOWNLOAD these apps. We are simply linking to them so that users can recognize the apps. Affected apps include:  

Wechat The most popolar messaging app in China 

网易云音乐 (NetEase Cloud Music) - Netease free Spotify-type app

网易公开课 (NetEase) - open education app, used by many students

中信银行动卡空间 (China CITIC Bank Card Space)

中国联通手机营业厅 (China Unicom Shop)

滴滴出行 (DiDi travel) - the popular car sharing app

12306 - only train ticketing website

高德地图 (Auto-Navigation)

It is important to note that the two Netease apps are official apps from Netease. Netease is one of the biggest internet companies in China. Wechat is the most popular messaging app in China. China Unicom is one of China’s major telecom companies and CITIC is one of the country’s largest banks. These apps are likely to be extremely popular and highly trusted by users. It is extremely irresponsible for developers in those companies to ignore digital signature warnings and to continue to use compromised Xcode. If the malware author did a targeted attack against wechat or CITIC, he would have been able to gain users credentials, collect chat history, contact list or even banking details!

Netease has already posted a warning about its music app for users:

Wechat also acknowleged the problem. 

What can compromised users do to mitigate this attack?

If you are an iPhone user, there is little you can do. Do not download the above apps. Do not give permissions to apps unless absolutely necessary. Enable two-step verification for Apple ID. Even though this specific malware does not seem to target Apple IDs at this time, it is possible that in the future more aggressive malware will be used to display a fake window asking for sign-in credentials. According to paloaltonetworks, the current malware is affecting:

  • Current time

  • Current infected app name

  • The app bundle identifier

  • Current device name and type

  • Current system language and country

  • Current device UUID

  • Network type

 

If you are an iOS developer, however, a lot can be done to secure your development system:

  • Always download Xcode from the official Mac App Store. For other developer tools, always download these from official sources.

  • Always check the digital signature of developer tools. It is irresponsible for developers to ignore signature warnings. Xcode clearly should have been signed by Apple; all other versions should have produced user warnings.

  • Separate your development system with your everyday system. Development systems should be used solely for development and not for browsing random sites. If physical separation presents too much of a problem for developers, at the very least, a dedicated user account for development should be used.

What should Apple do to mitigate this compromise?

Apple should immediately scan their entire App Store to look for malware signatures and to remove all apps that are affected.

Apple’s Gatekeeper should implement a pre-loaded list of apps to enforce signature validation. For example, if Xcode and other crucial apps have invalid signatures, the OS should not allow users to bypass and proceed with installation. (This idea is similar to HSTS preload, in an effort to prevent network attacks.)

We have asked Apple to comment on their mitigation strategy in this instance and to outline their plans for future defense mechanisms to avoid a repeat of this situation.

Update: Apple scanned and took down infected apps in the App store and sent emails to urge developers to download Xcode from official sources.

Who is behind the attack and why would somebody create this compromise?

CoderFun first started to release compromised Xcode about 5 months ago.

 

It seems that this particular malware is being used to collect device information for data mining. However, the malware could have been used more aggressively to collect private information such as contacts, photos, and even iCloud passwords via phishing when combined with other evasion mechanisms to counter manual reviews.
 

References:

http://drops.wooyun.org/news/8864

http://weibo.com/1708947107/CAVdJ8Epo?from=page_1005051708947107_profile&wvr=6&mod=weibotime&type=comment#_rnd1442530292827

http://researchcenter.paloaltonetworks.com/2015/09/novel-malware-xcodeghost-modifies-xcode-infects-apple-ios-apps-and-hits-app-store/

 

Comments

More Blog Posts

Subscribe to our mailing list
Show content from Blog | Google+ | Twitter | All. Subscribe to our blog using RSS.

Thu, Aug 10, 2023

1.4 million people used FreeBrowser to circumvent the Great Firewall of Turkmenistan

Since 2021, the authorities in Turkmenistan have taken exceptional measures to crack down on the use of circumvention tools. Citizens have been forced to swear on the Koran that they will not use a VPN. Circumvention tool websites have been systematically blocked. Arbitrary searches of mobile devices have also taken place and have even targeted school children and teachers.

The government has also blocked servers hosting VPNs which led to “near complete” internet shutdowns on several occasions in 2022. Current reports indicate that 66 hosting providers, 19 social networks and messaging platforms, and 10 leading content delivery networks (CDNs), are blocked in the country. The government presumably is unconcerned about the negative economic impact that such shutdowns can cause.

Fri, Mar 18, 2022

Well-intentioned decisions have just made it easier for Putin to control the Russian Internet

This article is in large part inspired by a recent article from Meduza (in Russian).

Since the beginning of the war in Ukraine, Russian users have had problems accessing government websites and online banking clients. Browsers began to mark these sites as unsafe and drop the connection. The reason is the revocation of digital security certificates by foreign certificate authorities (either as a direct consequence of sanctions or as an independent, good will move); without them, browsers do not trust sites and “protect” their users from them.

However, these actions, caused - or at least triggered by - a desire to punish Russia for their gruesome actions in Ukraine, will have long-lasting consequences for Russian netizens.

Digital certificates are needed to confirm that the site the user wants to visit is not fraudulent. The certificates contain encryption keys to establish a secure connection between the site and the user. It is very easy to understand whether a page on the Internet is protected by a certificate. One need just look at the address bar of the browser. If the address begins with the https:// prefix, and there is a lock symbol next to the address, the page is protected. By clicking on this lock, you can see the status of the connection, the name of the Certification Authority (CA) that issued the certificate, and its validity period.

There are several dozen commercial and non-commercial organizations in the world that have digital root certificates, but 3/4 of all certificates are issued by only five of the largest companies. Four of them are registered in the USA and one is registered in Belgium.

Mon, Aug 03, 2020

Announcing the Release of GreatFire AppMaker

GreatFire (https://en.greatfire.org/), a China-focused censorship monitoring organization, is proud to announce that we have developed and released a new anti-censorship tool that will enable any blocked media outlet, blogger, human rights group, or civil society organization to evade censors and get their content onto the phones of millions of readers and supporters in China and other countries that censor the Internet.

GreatFire has built an Android mobile app creator, called “GreatFire AppMaker”, that can be used by organizations to unblock their content for users in China and other countries. Organizations can visit a website (https://appmaker.greatfire.org/) which will compile an app that is branded with the organization’s own logo and will feature their own, formerly blocked content. The app will also contain a special, censorship-circumventing web browser so that users can access the uncensored World Wide Web. The apps will use multiple strategies, including machine learning, to evade advanced censorship tactics employed by the Chinese authorities.  This project will work equally well in other countries that have China-like censorship restrictions. For both organizations and end users, the apps will be free, fast, and extremely easy to use.

This project was inspired by China-based GreatFire’s first-hand experience with our own FreeBrowser app (https://freebrowser.org/en) and desire to help small NGOs who may not have the in-house expertise to circumvent Chinese censorship. GreatFire’s anti-censorship tools have worked in China when others do not. FreeBrowser directs Chinese internet users to normally censored stories from the app’s start page (http://manyvoices.news/).

Fri, Jul 24, 2020

Apple, anticompetition, and censorship

On July 20, 2020, GreatFire wrote to all 13 members of the Subcommittee on Antitrust, Commercial and Administrative Law of the U.S. House Committee on the Judiciary, requesting a thorough examination into Apple’s practice of censorship of its App Store, and an investigation into how the company collaborates with the Chinese authorities to maintain its unique position as one of the few foreign tech companies operating profitably in the Chinese digital market.  

This letter was sent a week before Apple CEO TIm Cook will be called for questioning in front of the Subcommittee on Antitrust, Commercial and Administrative Law. The CEOs of Amazon, Google and Facebook will also be questioned on July 27, as part of the Committee’s ongoing investigation into competition in the digital marketplace.

This hearing offers an opportunity to detail to the Subcommittee how Apple uses its closed operating ecosystem to not only abuse its market position but also to deprive certain users, most notably those in China, of their right to download and use apps related to privacy, secure communication, and censorship circumvention.

We hope that U.S. House representatives agree with our view that Apple should not be allowed to do elsewhere what would be considered as unacceptable in the U.S. Chinese citizens are not second class citizens. Private companies such as Apple compromise themselves and their self-proclaimed values of freedom and privacy when they collaborate with the Chinese government and its censors.

Mon, Jun 10, 2019

Apple Censoring Tibetan Information in China

Apple has a long history of censorship when it comes to information about Tibet. In 2009, it was revealed that several apps related to the Dalai Lama were not available in the China App Store. The developers of these apps were not notified that their apps were removed. When confronted with these instances of censorship, an Apple spokesperson simply said that the company “continues to comply with local laws”.

In December, 2017, at a conference in China, when asked about working with the Chinese authorities to censor the Apple App Store, Tim Cook proclaimed:

"Your choice is: do you participate, or do you stand on the sideline and yell at how things should be. And my own view very strongly is you show up and you participate, you get in the arena because nothing ever changes from the sideline."

In the ten years since Apple was first criticized for working with the Chinese authorities to silence already marginalized voices, what has changed? Apple continues to strictly follow the censorship orders of the Chinese authorities. When does Tim Cook expect that his company will help to bring about positive change in China?

Based on data generated from https://applecensorship.com, Apple has now censored 29 popular Tibetan mobile applications in the China App Store. Tibetan-themed apps dealing with news, religious study, tourism, and even games are being censored by Apple. A full list of the censored apps appear below.

Subscribe to our blog using RSS.

Comments

Terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/GE92a

thank for the information, i'm very happy visit to your website
http://goo.gl/6fBsU7

terima kasih atas informasinya, dan salam sehat.
http://bit.ly/1T7MCCX

thank for the information, succesfull and healthy always
http://obatradangtenggorokan79.mkes.info/

terima kasih atas informasinya, dan salam sehat.
http://obatmaagkronisalami53.mkes.info/

thank for the information, succesfull and healthy always
http://ow.ly/a7Vy3009ybL

thank's for the information, i'm very happy visit to your website
http://ow.ly/pxkK3009Kx4

terima kasih atas informasinya, dan salam sehat.
http://goo.gl/wd0nTe

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/p3CpC

this is a very nice information, i'm really happy visit to your website
http://ow.ly/SKbB300bvU7

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/rMe7Z

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/DweLT

terima kasih atas informasinya dan salam sehat.
http://zon9.xyz/NAp6x

terima kasih atas informasinya, dan salam sehat.
http://bit.do/b2oUr

thank for the information, succesfull and healthy always
http://goo.gl/ZG2vHU

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/E5R9M

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/8ae1z

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/hOQmb

terima kasih atas informasinya, dan salam sehat.
http://ow.ly/wwPf300bJAK

thank for the information, succesfull and healthy always
http://ow.ly/UDUT300bKYd

terima kasih atas informasinya, dan salam sehat.
http://bit.ly/1TTs5V7

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/ruhUO

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/l5J7m

thank's for the information, succesfull and healthy always
http://obatalergikulitalami.mkes.info/

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/RvLI7

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/2iPbA

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/rMaG5

thank's for the information, your information is very nice
http://goo.gl/ZTgXYy

terima kasih atas informasinya, dan salam sehat.
http://ow.ly/TJka300ea13

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/Q92xo

terima kasih atas informasinya, dan salam sehat.
http://bit.do/b2wy3

thank's for the information, i'm very happy visit to your website http://goo.gl/XTmzSd

terima kasih atas informasinya, dan salam sehat.
http://ow.ly/XvHr300gwzI

terima kasih atas informasinya, dan salam sehat.
http://zon9.xyz/BX6Rc

terima kasih atas informasinya, dan salam sehat.
http://bit.ly/1TjKewu

terima kasih atas informasinya, dan salam sehat.
http://ow.ly/W9SH300gVfX

terima kasih atas informasinya, dan salam sehat.
http://obattradisionaljantungbengkak55.mkes.info/

thank for the information, succesfull and healty always
http://ow.ly/AMYC300j87V

terima kasih atas informasinya, dan salam sehat.
http://obatsyarafkejepit99.mkes.info/

terima kasih atas informasinya, dan salam sehat.
http://ow.ly/DpVY300jaYg

terimakasih informasinya, sukses terus buat informasinya gan
http://pengobatanherbalalamigagaljantung.mkes.info/

terima kasih atas informasinya, dan salam sehat.
http://ow.ly/6Ima300jcsY

terima kasih atas informasinya, dan salam sehat.
http://ow.ly/P5Pa300jdUR

terima kasih atas informasinya, dan salam sehat.
http://bit.ly/1WC3Kal

terima kasih atas informasinya, dan salam sehat.
http://ow.ly/ehPJ300jkDG

terima kasih atas informasinya, dan salam sehat.
http://ow.ly/iYIy300jxIc

terima kasih atas informasinya, dan salam sehat.
http://bit.do/b2VKL

terima kasih atas informasinya, dan salam sehat.
http://tiny.cc/7mhkby

terima kasih atas informasinya, dan salam sehat.
http://bit.do/b2YSM

terima kasih atas informasinya, dan salam sehat.
http://tiny.cc/259kby

Pages

Add new comment

Filtered HTML

  • Web page addresses and e-mail addresses turn into links automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <blockquote> <code> <ul> <ol> <li> <dl> <dt> <dd>
  • Lines and paragraphs break automatically.

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
By submitting this form, you accept the Mollom privacy policy.