In-depth

Why Apple fanboys are in security denial

Davey Winder tells Apple users why they're wrong to assume their operating systems are "more secure" than Microsoft's

Apple's operating systems are often considered to be "more secure" than Microsoft's offerings, particularly on the malware front.  

More secure is not (no matter how loud the Apple fanboys scream) the same as totally secure though.

Apple claims "iOS is designed with advanced security technologies built in so that IT has end-to-end control of devices, data and apps" and goes on to insist that "iOS delivers a secure architecture and provides enhanced data protection." Both these claims would appear to be less than, well, secure.

Last week security researchers at FireEye talked about an iOS vulnerability under a disclosure piece entitled 'All Your iOS Apps Belong to Us.'  The so-called Masque Attack is of particular interest to enterprise iOS users because it means a genuine 'App Store App' could be replaced by a malicious one installed through the enterprise provisioning process.

Advertisement
Advertisement - Article continues below

All it takes is for both applications to use the same bundle identifier. The only apps not at risk are the pre-installed iOS ones such as Mobile Safari for example.

How can this be? Surely there's some highly convoluted methodology at play to get around the iOS secure architecture of which Apple is so proud? Erm, nope, not really.

iOS simply doesn't enforce matching certificates for apps with the same bundle identifier. End of. This isn't your usual 'oh but if a device is jailbroken then users get what they deserve' exercise either, as FireEye verified the vulnerability for jailbroken and non-jailbroken devices with equal impact.

What's more, the company did so through wireless network and USB access. The researchers responsibly disclosed the vulnerability to Apple back in July, and Apple says the vulnerability "hasn't been used against customers, and security measures are in place to prevent bad software from making its way onto your device" so that's OK then. Apart from the fact it isn't.

FireEye says it has examined how the WireLurker malware is actively utilising Masque, albeit in a limited form, to attack iOS devices through USB.

It's possible, the researchers say, to replace a banking app this way and gain access to banking credentials. It's also possible for the malware to be able to access the original application's local data as this is not always removed when that app is replaced. Data which may include login-tokens or cached emails, for example. Still, as long as Apple isn't concerned you don't need to be, right? Wrong! With a bloody big W.

Individual iOS users are, fair enough, pretty safe from the risk which Masque poses, but enterprise users are not. Apps distributed using enterprise provisioning profiles are not subject to the Apple security review process.

Obviously, to mitigate the enterprise risk, only apps from the enterprise's own secure site should be installed, and users shouldn't install any from third-party sites or just because a pop-up tells them to.

Any iOS alerts concerning untrusted app developers should be taken seriously and the don't trust option selected. Better still, Apple could get off it's high horse and fix the problem for everyone, and that includes enterprise users.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/business-strategy/33311/apple-launches-new-tv-gaming-and-finance-services
Business strategy

Apple launches new TV, gaming and finance services

25 Mar 2019
Visit/hardware/33929/jony-ive-a-retrospective
Hardware

Jony Ive: A retrospective

29 Nov 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019
Visit/hardware/34606/apple-ipad-102in-2019-review-the-ipad-grows-up
Hardware

Apple iPad 10.2in (2019) review: The iPad grows up

10 Oct 2019

Most Popular

Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/network-internet/wifi-hotspots/354283/industrial-wi-fi-6-trial-reveals-blistering-speeds
wifi & hotspots

Industrial Wi-Fi 6 trial reveals blistering speeds

5 Dec 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019