Security Market Segment LS
Thursday, 18 December 2014 14:27

‘Man-in-the-middle’ attacks target iOS, Android devices Featured

By
 Image courtesy of ddpavumba freedigitalphotos.net/images Image courtesy of ddpavumba freedigitalphotos.net/images

Unsuspecting mobile device users are being targeted by the Xsser mobile remote access Trojan (mRAT), with attackers, described as “malicious actors”, tricking users into downloading unverified apps.

A cyber alert from cloud services provider Akamai Technologies, through its Prolexic Security & Research Team, warns of the threat to users of iOS and Android devices from man-in-the-middle attacks

According to Akamai, the Xsser mRAT is spread through man-in-the-middle and phishing attacks and may involve cellphone tower eavesdropping for location-specific attacks.

"Sophisticated malicious actors are targeting unsuspecting mobile device users," said Stuart Scholly, senior vice president and general manager, Security Business Unit, Akamai.

"Attackers are impersonating or bypassing Google and Apple app stores and using social engineering to trick users into downloading unverified apps that install malicious applications such as the Xsser remote access Trojan onto a user's mobile device. For example, attackers offered a counterfeit Flappy Birds app download to deliver the malicious software.

Formerly, Xsser mRAT targeted only Android devices, but Akamai says that a new variant infects jailbroken iOS devices, with the app installed via a rogue repository on Cydia, the most popular third-party application store for jailbroken iPhones.

Scholly says that once the malicious bundle has been installed and executed, it gains persistence – preventing the user from deleting it. The mRAT then makes server-side checks and proceeds to steal data from the user's device and executes remote commands as directed by its command-and-control (C2) server.

"Infected phones with the remote access software installed could be used for a wide variety of malicious purposes including surveillance, the stealing of login credentials, launching distributed denial of service (DDoS) attacks, and more.

"With more than a billion smartphone users worldwide, this kind of malware creates significant risks to privacy and a risk of rampant illegal activity."

Scholly describes jailbreaking as the process of removing limitations and security checks in the iOS operating system in order to allow users to install applications from other application stores, and says that In China, for example, 14% of the 60 million iOS devices are estimated to have been jailbroken, often to support the use of third-party Chinese character keyboard apps.

“Jailbroken phones are at greater risk for malware,” Scholly warns.

Scholly says the best protection for users is to prevent infection, although he says that it is difficult to detect whether a phone is under attack from malware such as Xsser mRAT, “so a focus on prevention is necessary.”

“Virtual private networks (VPN), two-factor authentication, peer-to-peer proximity networking and commercial phone security applications can provide some protection. Avoiding the use of free Wi-Fi hotspots and automatic connections, ignoring unexpected communications, not jailbreaking phones and not using apps from untrusted sources are some of the self-protection approaches,” Scholly says.


A complimentary copy of the threat advisory issued by Akamia is available for download here


Subscribe to ITWIRE UPDATE Newsletter here

Now’s the Time for 400G Migration

The optical fibre community is anxiously awaiting the benefits that 400G capacity per wavelength will bring to existing and future fibre optic networks.

Nearly every business wants to leverage the latest in digital offerings to remain competitive in their respective markets and to provide support for fast and ever-increasing demands for data capacity. 400G is the answer.

Initial challenges are associated with supporting such project and upgrades to fulfil the promise of higher-capacity transport.

The foundation of optical networking infrastructure includes coherent optical transceivers and digital signal processing (DSP), mux/demux, ROADM, and optical amplifiers, all of which must be able to support 400G capacity.

With today’s proprietary power-hungry and high cost transceivers and DSP, how is migration to 400G networks going to be a viable option?

PacketLight's next-generation standardised solutions may be the answer. Click below to read the full article.

CLICK HERE!

WEBINAR PROMOTION ON ITWIRE: It's all about webinars

These days our customers Advertising & Marketing campaigns are mainly focussed on webinars.

If you wish to promote a Webinar we recommend at least a 2 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://www.itwire.com/itwire-update.html and Promotional News & Editorial.

This coupled with the new capabilities 5G brings opens up huge opportunities for both network operators and enterprise organisations.

We have a Webinar Business Booster Pack and other supportive programs.

We look forward to discussing your campaign goals with you.

MORE INFO HERE!

BACK TO HOME PAGE
Peter Dinham

Peter Dinham - an iTWire treasure is a mentor and coach who volunteers also a writer and much valued founding partner of iTWire. He is a veteran journalist and corporate communications consultant. He has worked as a journalist in all forms of media – newspapers/magazines, radio, television, press agency and now, online – including with the Canberra Times, The Examiner (Tasmania), the ABC and AAP-Reuters. As a freelance journalist he also had articles published in Australian and overseas magazines. He worked in the corporate communications/public relations sector, in-house with an airline, and as a senior executive in Australia of the world’s largest communications consultancy, Burson-Marsteller. He also ran his own communications consultancy and was a co-founder in Australia of the global photographic agency, the Image Bank (now Getty Images).

Share News tips for the iTWire Journalists? Your tip will be anonymous

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments