WireLurker, the malware targeting Mac, iOS devices – Apple blocks it.

Mac OS users have spent long with fearless safety of their machines from malwares or viruses and the same has been considered for the iOS devices. But now the “WireLurker” is something that has been discovered to infect Apple’s Mac OS computers and iOS devices.

Palo Alto Networks, the security researchers and developers, have discovered the malware that detects any iOS device including iPhone or iPad when connected via a USB to an infected OS X computer and transfers downloaded third-party malicious applications to the connected device. It equally treats a non-jailbroken or jailbroken device. The company named it as “WireLurker”.

WireLurker was used to trojanize 467 OS X applications on the Maiyadi App Store, a third-party Mac application store in China. In the past six months, these 467 infected applications were downloaded over 356,104 times and may have impacted hundreds of thousands of users.

Researchers have demonstrated similar methods to attack non-jailbroken devices before; however, this malware combines a number of techniques to successfully realize a new brand of threat to all iOS devices.

Interestingly, Apple has responded very quickly and said “We are aware of malicious software available from a download site aimed at users in China, and we’ve blocked the identified apps to prevent them from launching.”

There is need to question as Apple has not clarified on how they are carrying out the procedure. The company only emphasised “As always, we recommend that users download and install software from trusted sources.” holding the users responsible for that.

Anyway, the security firm has also listed some steps to mitigate the threat from WireLurker in this article. A tool has also been developed to detect if your device is infected with the WireLurker. Download WireLurker Detector.

If you wandering to fix something about it, then there are some steps to find and remove.

Jailbroken Users
  1. Install iFile from Cydia if you don’t have already. SSH through terminal can be used too.
  2. Go to /Library > MobileSubstrate > DynamicLibraries.
  3. Now search a file named sfbase.dylib, and if found, you know your device is infected. However, if no such file exists, breathe a sigh of relief.

A complete restore will do much better in any case but you may loose your jailbreak.

Non-Jailbroken Users
  1. Open the Settings. Go to General > Profile.
  2. Look for any non-standard profile listed. If you find one then just delete it.
  3. Delete all strange or suspicious apps that you see on your device.

 

source: Palo Alto Networks
v
ia: redmondpie, reddit 

Dr. H.

Recent Posts

Jazz launches Nothing Phones officially in Pakistan

Pakistan’s smartphone scene just got more exciting. The buzz around the much-talked-about tech company Nothing…

2 weeks ago

Starlink Internet in Pakistan – What’s the Status and Possible Pricing

In an exciting development for Pakistan’s tech landscape, SpaceX’s revolutionary satellite internet service, Starlink, could…

4 months ago

Google Wallet Launching in Pakistan This January

In an exciting development for digital payment enthusiasts, Google has announced the expansion of its…

5 months ago

Beme Unveils the Beme Nomad Boost: A Revolutionary 4-in-1 Powerbank

Beme, a pioneering tech brand, is thrilled to introduce its latest innovation, the Beme Nomad…

11 months ago

With Presto, Apple can now update box-packed iPhone to latest iOS version in Stores

Apple is gearing up for the highly anticipated launch of the iPhone 16 lineup later…

1 year ago

OPPO Unveils the Reno11 Series 5G in Pakistan – Price and Detail Inside

OPPO, known for its innovation in smart devices, has announced the launch of its high-end…

1 year ago