Call it a case of Jekyll apps that can hide.
Georgia Tech researchers have developed a proof-of-concept attack called Jekyll that involves using Trojan Horse-style apps to sneak malware past Apple's app review process and onto iOS devices such as the iPhone and iPad.
[ Security expert Roger A. Grimes offers a guided tour of the latest threats and explains what you can do to stop them in InfoWorld's "Fight Today's Malware" Shop Talk video and Malware Deep Dive Report. | Learn how to secure your systems with InfoWorld's Security Central newsletter. ]
Georgia Tech Information Security Center (GTISC) Associate Director Paul Royal says we can get lulled into a fall sense of security by Apple's renowned app review process for iOS devices.
[ IPHONEYS: The iPhone 6 edition ]
Researcher Tielei Wang's team created a proof-of-concept attack that was published in the Apple App Store and used to remotely launch attacks on a controlled batch of devices, enabling them to post unauthorized tweets, take photos and even go after other apps.
More detailed findings are being revealed in a paper titled "Jekyll on iOS: When Benign Apps Become Evil," which will be presented at the USENIX Security Symposium Aug. 14-16 in Washington, D.C.
Separately, researcher Billy Lau's team has investigated how iOS device peripherals might attack the devices. Using a BeagleBoard, Lau's team created a USB malicious charger called Mactans that can install apps without user knowledge within a minute of being plugged in.
"Despite the plethora of defense mechanisms in iOS, Mactans was able to install arbitrary apps within one minute of being plugged into current-generation Apple devices running the latest operating system software," said Lau, in a statement. "All users are affected, as our approach requires neither a jailbroken device nor user interaction."
Apple has been notified by the Georgia Tech researchers of the flaws their teams discovered, and the company has implemented a feature in iOS 7 to warn users of suspicious behavior by peripherals. Apple is working on the Jekyll vulnerability.
The peripherals threat is being discussed this week at the Black Hat USA conference in Las Vegas, where Georgia Tech is presenting the paper "Mactans: Injecting Malware into iOS Devices via Malicious Chargers."
The growing threat of compromised mobile devices has largely centered around Android, though security watchers anticipate malware writers to put more effort into cracking iOS devices, particularly as they become more popular in corporate networks. Even Apple rival BlackBerry has addressed this issue by expanding its Secure Work Space offering, which divvies up work and personal apps/data, into Android and iOS environments.
Read more about wireless & mobile in Network World's Wireless & Mobile section.
This story, "Researchers demo how apps, chargers can circumvent Apple iPhone, iPad security" was originally published by Network World.