santiago silver - Fotolia
Palo Alto Networks reported on a new iOS Trojan called AceDeceiver that can install itself on devices without using any kind of certificate. How does AceDeceiver do this, and what can security teams do about iOS Trojans like this?
AceDeceiver can be installed on iOS devices without jailbreaking the device or abusing the enterprise certificate install functionality. Palo Alto doesn't describe the malicious behavior of the application other than how it collects the AppleID and password, and how the application is initially targeted. Collection of the AppleID and password opens the user up to potential malicious activities and in itself is sufficient reason to classify AceDeceiver as malware. It appears AceDeceiver may have started out as a quasi-legitimate application for users to install pirated iOS applications. AceDeceiver has terms of service that state it is not responsible for malicious activities and other potentially questionable activities.
AceDeceiver can bypass standard install protections by abusing the FairPlay functionality used for Digital rights management. Researchers from Georgia Tech presented an attack on Fairplay at USENIX Security 2014. The attack basically works by performing a man-in-the-middle attack using a system running iTunes, reusing the authorization code used for installing a legitimate app. It appears to target systems in mainland China, and only uses the nonmalicious functionality outside of that region.
Enterprises have several options for protecting their devices from this iOS Trojan. Palo Alto released indicators of compromise for the malware including the DNS names of the command-and-control infrastructure. Using these indicators of compromise, other security tools can detect and block the malware.
Learn more on Apple's iOS encryption and data protection features
Read how to defend against KeyRaider iOS malware
Find out how to mitigate iOS mobile phishing issues
Dig Deeper on Mobile security threats and prevention
Related Q&A from Nick Lewis
Port scans provide data on how networks operate. In the wrong hands, this info could be part of a larger malicious scheme. Learn how to detect and ... Continue Reading
Cloud penetration testing presents new challenges for information security teams. Here's how a playbook from the Cloud Security Alliance can help ... Continue Reading
Many cloud providers are tight-lipped about internal security control details. Learn how to evaluate cloud security providers with certifications and... Continue Reading