XcodeGhost iOS Trojan Infected Over 4000 Apps

Use Netsparker


So the recent XcodeGhost iOS Trojan Infection has escalated quickly, an initial estimate of 39 infected apps has rapidly increased to over 4000!

XcodeGhost iOS Infection Over 4000 Apps

You can see the FireEye announcement here: Protecting Our Customers from XcodeGhost

XCodeGhost is the first instance of the iOS App Store distributing a large number of trojanized apps, the malicious/infected apps steal device and user information and send stolen data to a command and control (CnC) server

The number of XCodeGhost-infected iOS apps, initially pegged at 39, has ballooned to more than 4,000.

The staggering increase was the handiwork of analysis by FireEye researchers who said that the apps were being hosted on the official Apple App Store.

“Immediately after learning of XcodeGhost, FireEye Labs identified more than 4,000 infected apps on the App Store,” FireEye said.

The malicious apps steal device and user information and send stolen data to a command and control (CnC) server [and] also accept remote commands including the ability to open URLs sent by the CnC server.

These URLs can be phishing webpages for stealing credentials, or a link to an enterprise-signed malicious app that can be installed on non-jailbroken devices.

A FireEye spokesman told Vulture South that many of the infected apps were owned by “big Chinese global brands” such as consumer electronics, telcos, and banks.

The Register has asked FireEye for the names of some of the prominent affected apps and will update this story should the information come to hand.

FireEye put the huge increase in the number of discovered apps to fast scanning by its mobile threat prevention platform.


It seems to be heavily linked to China, with the original XcodeGhost author also being Chinese, you can see the code repo here: XcodeGhost

A translation using Google sees the author apologise and say he wrote this as a personal experiment and the original only collects non-personal data like device type, iOS version, language, country, device name and so on.

Apple has continued to exorcise the App Store of malicious apps uploaded in what has been widely considered to be Cupertino’s first big malware attack.

The apps were infected after developers downloaded a copy of the Xcode iOS development tool through a file-sharing service. That package was modified to trojanise apps in a way that passed App Store security checks, and was advertised on popular developer forums as a faster source to download the 3Gb Xcode file.

The success of the XCodeGhost phish is staggering; that some 4,000 apps were hosed indicates that a lot of developers were sucked into what must have been a very well-executed attack by highly capable malefactors.

Veracode principal solutions architect John Smith said that the attack challenged the notion that iOS was safer than Android.

“In recent years it has seemed that the problem of mobile malware was bigger for Android than for iOS,” Smith said.

“The more rigorous testing regime required before an iOS app can be published has always been considered to be the reason for this difference, but in this case it seems to have fallen short.”

From an infection graph, it seems like it’s been going on for a while, since April 2015 at least – but there’s been a huge peak in infected apps in September.

It’s surprising that such a large number of apps were able to violate Apple’s stringent App Store policies for such an extended period of time.

Even then, it seems like the implementation of XcodeGhost isn’t that malicious and they aren’t sending much more than the original author intended.

Source: The Register

Posted in: Apple, Exploits/Vulnerabilities, Malware

, ,


Latest Posts:


DeepSound - Audio Steganography Tool DeepSound – Audio Steganography Tool
DeepSound is an audio steganography tool and audio converter that hides secret data into audio files, the application also enables you to extract from files.
2019 High Severity Vulnerabilities What are the MOST Critical Web Vulnerabilities in 2019?
So what is wild on the web this year? Need to know about the most critical web vulnerabilities in 2019 to protect your organization?
GoBuster - Directory/File & DNS Busting Tool in Go GoBuster – Directory/File & DNS Busting Tool in Go
GoBuster is a tool used to brute-force URIs (directories and files) in web sites and DNS subdomains (inc. wildcards) - a directory/file & DNS busting tool.
BDFProxy - Patch Binaries via MITM - BackdoorFactory + mitmProxy BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy
BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads
Domained - Multi Tool Subdomain Enumeration Domained – Multi Tool Subdomain Enumeration
Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains.
Acunetix Vulnerability Scanner For Linux Now Available Acunetix Vulnerability Scanner For Linux Now Available
Acunetix Vulnerability Scanner For Linux is now available, now you get all of the functionality of Acunetix, with all of the dependability of Linux.


Comments are closed.