Malicious worm turns iPhones into zombies

Jail-broken iPhones are targeted in an attack which could make them part of a botnet.

zombie

The security threat to the iPhone has suddenly become more serious, as a new worm is out which can compromise the device and add it to a botnet.

Regular users don't need to worry too much yet, as just like the Rick Astley' worm Ikee it only affects jail-broken devices.

But if it does get hold of your iPhone, Dutch security researchers XS4ALL said that the worm was capable of stealing data, as well as giving control of it to a Lithuanian botnet command server.

Also like Ikee, the new worm breaks into jail-broken iPhones by using the default root password Alpine'. The researchers reported that it changes this, making it so a criminal could log back in.

The worm also assigns each iPhone a unique ID number, which could get specific devices to work and allows criminals to further investigate the device - very serious if it holds important data.

The worm may also be related to a banking trojan, as it was said to look for mTans, SMS messages used as part of two-factor banking authentication systems.

This is when a bank sends you an SMS when you attempt to login to an online bank account, which has a one-time password you enter to gain access.

Graham Cluley, senior security consultant at Sophos, told IT PRO that this threat could not be considered or called a prank like the Rick Astley worm, although it does appear to be based on the same source code.

"It's clearly designed to hijack computers and steal information from them," he said.

Cluley said it was important to realise that this only affected jail-broken iPhones and people who made a fundamental mistake by not changing the default password when tampering with it.

He said that iPhone was normally a closed and sandboxed device where Apple had control of what applications you could run. But he warned about the potential threat to devices that are more 'open' such as phones running the Android operating system.

"There's always the potential for those kind of attacks from malicious apps written," he said. "But I still [think] we are still a long, long away from malware on smartphones being anything as common as on Windows."

Featured Resources

Key considerations for implementing secure telework at scale

Identifying the security risks and advanced requirements of a remote workforce

Download now

The State of Salesforce 2020

Your guide to getting the most from Salesforce

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Rethink your cybersecurity strategy for the new world

5 steps to secure the enterprise and be fit for a flexible future

Download now

Recommended

Apple iPhone SE (2020) review: Cheap at twice the price
iOS

Apple iPhone SE (2020) review: Cheap at twice the price

7 Aug 2020
Malware attacks using machine identities doubled in 2019
cyber security

Malware attacks using machine identities doubled in 2019

4 Aug 2020
Sophos Central Endpoint Protection review: Because you’re worth it
endpoint security

Sophos Central Endpoint Protection review: Because you’re worth it

3 Aug 2020
Apple is under investigation for alleged deceptive practices
Policy & legislation

Apple is under investigation for alleged deceptive practices

24 Jul 2020

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

3 Aug 2020
How to use Chromecast without Wi-Fi
Mobile

How to use Chromecast without Wi-Fi

4 Aug 2020
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

3 Aug 2020