Vulnerability leaves iPhones and iPads open to fake app attack

Attackers can replace legitimate apps with fake ones that access and steal personal information

Security researchers have discovered a vulnerability in iPhones and iPads that allows attackers to install fake apps that take the place of legitimate ones.

FireEye, a mobile security company, said the problem, which it calls "Masque Attack," allows attackers to gain access to vast amounts of personal information.

In a video demonstration of the attack, an iPhone was sent a URL to install a new version of the "Flappy Bird" game. When the link was clicked, the iPhone asked the user to confirm installation of the game, but upon that confirmation what was actually downloaded and installed was a compromised version of the Gmail app.

The new Gmail app, installed over the top of the real one, mimicked the real one, making it difficult for a user to detect the change. But in the background, it uploaded the entire user mailbox to a server run by the attacker. A second part of the attack, also demonstrated in the video, allowed an attacker access to all SMS text messages sent to the phone.

Access to both email and SMS messages is frightening enough, but is especially problematic as both are used for password reset links and security PIN codes for access to apps and, sometimes, bank accounts.

The vulnerability exists in iOS versions 7.1.1, 7.1.2, 8.0, and 8.1.1 beta and is possible because iOS doesn't check the validity of the app's bundle identifier -- an ID string carried by each app that is supposed to be unique. If a fake app uses the same bundle identifier as a legitimate app, iOS doesn't question it, even if its from a different source, said FireEye.

Bowing to enterprise demand, Apple a year ago introduced the ability for IT to directly provision apps to iOS devices, bypassing the Apple App Store. The Masque Attack exploits that capability.

The only apps resistant to the attack are those that are preinstalled.

FireEye said it notified Apple about the problem on July 26.

Users can protect themselves against such attacks by only installing apps from Apple's App Store or a trusted enterprise store. Users are advised against clicking Install on pop-ups from third-party websites, no matter what reassurances are given, and clicking Don't Trust if the iPhone or iPad presents a pop-up saying the developer is not trusted.

To see if any apps have already been installed this way, iOS 7 users can check the provisioning profiles in the Settings app (General > Profiles) for suspicious entries, said FireEye. Phones running the latest iOS 8 don't show provisioning profiles, so such a check is not possible, the company said.

To comment on this article and other InfoWorld content, visit InfoWorld's LinkedIn page, Facebook page and Twitter stream.
From CIO: 8 Free Online Courses to Grow Your Tech Skills
Notice to our Readers
We're now using social media to take your comments and feedback. Learn more about this here.