iPhone Malware Attack Strikes Jailbroken Phones

Posted By: ASK  Posted date: October 6, 2015  In: Apple, Data Breaches, Hack, iPhone  No Comments Tags: , ,

 

Tech Rundown:

The iPhone, and Apple operating systems in general, are known for being more secure than their competitors. It has been revealed that malware hackers have stolen more than 225,000 apple accounts from iPhone customers. However, it is hard to point the finger at Apple in this case.

The malware that hacked iPhones has been nicknamed “KeyRaider” and has only targeted operating systems that have been jailbroken. KeyRaider has mainly been found in Chinese websites and apps, but it has since spread to 18 other countries, including the United States.malware attack security

So what exactly is the KeyRaider malware accessing? All of the victim’s iTunes App Store information, including the Apple account username, password and the iPhone’s unique ID. It also is blocking the victim from recovering their iPhone the malware has attacked.

Once KeyRaider has obtained this info, they use the victim’s accounts to allow others to purchase iTunes apps for “free.” About 20,000 people have signed up for the software that steals the account info from the 225,000 victims.

Many tech-savvy people chose to jailbreak their phones so that they can access apps that Apple does not offer on their iTunes store, mainly for security purposes.  However, doing this to a phone bypasses important security measures that Apple has strategically implemented to prevent hacks like KeyRaider.

This is the largest Apple account theft to date.

At ASK, we frequently see ransomware, which is a malware that prevents users from accessing their systems until they pay a certain amount of money. Most times, users don’t actually get their data back. We encourage businesses to have mitigation strategies put in place in advance of a CryptoLocker malware attack. These hacks are becoming more and more frequently as business continue to put valuable information on their systems. For more information on creating a disaster plan, contact us.

For more information, comments, or questions regarding Bottom Line IT, contact us at bottomline@justask.net.

About The Author

Got Something To Say:

Your email address will not be published. Required fields are marked *

*