Apple iPhones and iPads Under 'Masque Attack' Threat

By Vivek

Cyber security sleuths have alerted users of Apple iPhones and iPads against a lurking 'Masque Attack' on their devices that could compromise gadget safety and steal sensitive private information.

Recommended: Top 15 New Smartphones now Available with Exchange Offer

In its latest advisory to the users, the Computer Emergency Response Team-India (Cert-In) said, a vulnerability has been reported in Apple iOS which allows any iOS application that is installed using enterprise or ad hoc provisioning to replace any legitimate iOS application installed through App Store with any other malicious application.

Apple iPhones and iPads Under 'Masque Attack' Threat

"This attack is also known as 'Masque Attack' technique against Apple iOS. Successful exploitation of this vulnerability could allow remote attacker to steal sensitive information from the device, monitor user activities, gain root privileges on the device and launch further attacks," the CERT-In advisory said.

The CERT-In is the nodal agency to combat hacking, phishing and to strengthen security-related defences of the Indian internet domain.

The iOS is the backbone of all operations and apps in various Apple gadgets like iPhones, tabs and ipads. Apple has already asked users to download applications and other information from trusted sources only.

This vulnerability, the agency said, is caused due to iOS not properly enforcing and matching of certificates for apps (applications) with the same identifier.

Recommended: Panasonic Eluga I Now Listed in Flipkart at Rs 9,999: Top 10 Midrange Smartphone Rivals

"A remote attacker could exploit this vulnerability by tricking the victim into installing an application from a source other than the iOS App store or their organizations provisioning system. Attacker could then utilize this application to replace other legitimately installed applications, except iOS preinstalled applications, with any malicious application that uses the bundle identifier of the legitimate application thus bypassing the App Store review process," it said.

The agency called it a "high" rated threat and said it could affect various versions of the Apple iOS.

The cybersecurity agency has also suggested some counter-measures in this regard.

"Don't install apps from third-party sources other than Apple's official App Store or your own organization, don't click 'install' on a pop up from a third-party web page, carefully read iOS notification while opening applications and if iOS shows an 'untrusted App Developer' alert click on 'don't trust' and uninstall the application immediately," it recommended.


Most Read Articles
Best Mobiles in India

Best Phones

Get Instant News Updates
Notification Settings X
Time Settings
Clear Notification X
Do you want to clear all the notifications from your inbox?
Yes No
Settings X
We use cookies to ensure that we give you the best experience on our website. This includes cookies from third party social media websites and ad networks. Such third party cookies may track your use on Gizbot sites for better rendering. Our partners use cookies to ensure we show you advertising that is relevant to you. If you continue without changing your settings, we'll assume that you are happy to receive all cookies on Gizbot website. However, you can change your cookie settings at any time. Learn more