Cloud Atlas is the latest purported example of sophisticated
state-sponsored malware, said to have snooped on diplomats, oil industry
workers and the financial industry, intercepting communications and
recording phone calls.
And iPhone and iPad users don't escape entirely unscathed.
According to detailed reports published by Blue Coat and Kaspersky,
victims in Russia and other countries around the globe would be duped
into opening documents and clicking on links—believing they were going
to read an advert for an old diplomatic car or click on a link to an
upgraded version of WhatsApp.
The devices which were probably most likely to have been affected by
the malware attack, which exploited vulnerabilities in the Word Rich
Text Format (RTF), were regular Windows computers, who might find
themselves on the receiving end of decoy documents claiming to come from
"Mrs World" (seemingly with words taken from a Russian news site),
adverts for diesel engine parts or files called "Diplomatic Car for
Sale.doc."
But the good news is that if you haven't jailbroken your iOS device,
Cloud Atlas isn't likely to give you much cause for concern.
The simple truth can't be ignored that there is much much more
malware for Windows and Android than there is for Macs and iPhones.
That doesn't mean, of course, that you can afford to be glib when it
comes to protecting your Apple devices—but the majority of malware that
is created is written for operating systems that weren't developed in
Cupertino.
And the sophisticated Cloud Atlas malware (also called "Inception" by some security vendors, but detected by Intego products as iOS/CloudAtlas) infects Windows computers, BlackBerrys and Android devices, appears to be no different.
It can only exploit Apple's iOS iPhones and iPads if they have been jailbroken.
And, I have to wonder, is jailbreaking as popular today with iPhones
and iPads as it was in the past? The addition of new features into iOS 8
(such as share extensions and custom keyboards)
has surely chipped away at the attraction of cracking open the
operating system and allowing apps from beyond the walled garden of the
App Store to be installed.
None of this, of course, makes it any less attractive for a determine
hacker (or a foreign government interested on spying on the secrets of
others) from attempting to infect whatever brand of mobile phone their
target might choose to carry. And that probably explains why security
researchers found the iOS malware on the same server that was hosting
the Android and BlackBerry trojans.
Blue Coat researchers observed that links to the mobile versions of
the Cloud Atlas spyware would be distributed by bogus mailshots, such as
this one claiming to be a new version of WhatsApp sent to a Paraguayan
government email address:
Once installed on a jailbroken iOS device, the malware can collect a
wide variety of information and transmit it to an FTP account under the
attackers' control.
None of this, though, will be successful if you left your iPhone or
iPad in its factory state, and declined to jailbreak it to allow
unvetted third-party apps to have free reign over your device.
The message is simple: You may have lots of reasons why you want to jailbreak your iPhone, but you are putting yourself at greater risk of compromise via government spyware.
0 comments:
Post a Comment