November 11, 2014 By Shane Schick 2 min read

Through a spear-phishing-like “Masque attack,” attackers are creating iOS apps that resemble popular mobile tools in order to lure unsuspecting iPhone users into entering personal information they can capture, according to security researchers.

A report on AppleInsider said FireEye, the firm that discovered the vulnerability, reported the issue to Apple more than three months ago. So far, however, Apple hasn’t provided a way to protect against the Masque attack on the latest versions of its popular mobile operating system.

Ever since websites became widely used, cybercriminals have created phony websites and used email or other tactics — called phishing — to draw in visitors and rob them of their personal data. A Masque attack is similar in that it begins with a text message to smartphone users with links to an iOS app they already use. When users download what they believe is the latest version, a malicious app replaces the original. As The Next Web pointed out, attackers may be able to steal data from consumers without their being any the wiser because the malicious app looks legitimate.

Apple is already reeling from WireLurker, an iOS Trojan that has reportedly affected an untold number of iPhone users. The two threats share one thing in common: the use of “enterprise provision” profiles. Large companies may not want to post internal apps on Apple’s App Store, and enterprise provision profiles allow them a workaround of sorts.

Security experts told Reuters that there is at least one way to cut off a Masque attack at the pass: A pop-up will give users a choice of whether to install any app updates. Not all developers use text messages or push notifications to promote new versions, so if there is reason to believe Apple hasn’t approved an app, it’s obviously best to not install it. Apple uses something called “bundle identifiers” to give such updates the green light.

Meanwhile, according to Forbes, FireEye said the attacks could have some of the most severe repercussions of any iOS threat to date because the malicious app looks genuine. In other words, if users are fooled into updating their Gmail or banking app, copied versions on attackers’ servers could gather all kinds of passwords or financial information.

As an analysis on Mashable suggested, iPhone users’ best bet to avoid the worst is to check with their IT department if they receive any unexpected app updates that don’t come through Apple’s App Store. In the meantime, many enterprise CISOs are undoubtedly waiting to hear what their companies can do to stem the increasing tide of iOS attacks.

Image Source: Flickr

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today