The device doesn’t have to be jailbroken for WireLurker to infect it (the malware abuses Apple’s enterprise provisioning plumbing to pull that off), but jailbroken devices do get special attention. WireLurker steals additional info from the iMessage history, address book, and a handful of other files. According to security researcher Johnathan Zdziarski, WireLurker’s primary target doesn’t appear to be the data in the devices it infects. Rather, it seems as though it’s trying to identify software pirates — nice to know, but not necessarily all that reassuring. Someone is still pushing your personal information to a remote server.
![](file:///C:/Users/Fahim/AppData/Local/Temp/msohtmlclip1/02/clip_image001.jpg)
WireLurker also tries to sneak malicious apps onto the device while it’s connected — and many users won’t even notice their installation. Zdziarski says that “user education is the biggest problem” when it comes to WireLurker, adding that “Apple has a poor reputation for helping their users make smarter decisions about security.”
The good news is that there are tools out there to combat WireLurker. Palo Alto Networks offers a free WireLurker detector, and you’re probably not in any danger of infection if you don’t download warez from shady websites.
If your Mac is clean, then you should be fine. Just don’t go plugging your iPhone or iPad into someone else’s Mac for a little recharge or to swap some files without knowing whether or not it’s clean. You could end up transferring more than you wanted to.
0 comments:
Post a Comment