XcodeGhost iOS Trojan Infected Over 4000 Apps

The New Acunetix V12 Engine


So the recent XcodeGhost iOS Trojan Infection has escalated quickly, an initial estimate of 39 infected apps has rapidly increased to over 4000!

XcodeGhost iOS Infection Over 4000 Apps

You can see the FireEye announcement here: Protecting Our Customers from XcodeGhost

XCodeGhost is the first instance of the iOS App Store distributing a large number of trojanized apps, the malicious/infected apps steal device and user information and send stolen data to a command and control (CnC) server

The number of XCodeGhost-infected iOS apps, initially pegged at 39, has ballooned to more than 4,000.

The staggering increase was the handiwork of analysis by FireEye researchers who said that the apps were being hosted on the official Apple App Store.

“Immediately after learning of XcodeGhost, FireEye Labs identified more than 4,000 infected apps on the App Store,” FireEye said.

The malicious apps steal device and user information and send stolen data to a command and control (CnC) server [and] also accept remote commands including the ability to open URLs sent by the CnC server.

These URLs can be phishing webpages for stealing credentials, or a link to an enterprise-signed malicious app that can be installed on non-jailbroken devices.

A FireEye spokesman told Vulture South that many of the infected apps were owned by “big Chinese global brands” such as consumer electronics, telcos, and banks.

The Register has asked FireEye for the names of some of the prominent affected apps and will update this story should the information come to hand.

FireEye put the huge increase in the number of discovered apps to fast scanning by its mobile threat prevention platform.


It seems to be heavily linked to China, with the original XcodeGhost author also being Chinese, you can see the code repo here: XcodeGhost

A translation using Google sees the author apologise and say he wrote this as a personal experiment and the original only collects non-personal data like device type, iOS version, language, country, device name and so on.

Apple has continued to exorcise the App Store of malicious apps uploaded in what has been widely considered to be Cupertino’s first big malware attack.

The apps were infected after developers downloaded a copy of the Xcode iOS development tool through a file-sharing service. That package was modified to trojanise apps in a way that passed App Store security checks, and was advertised on popular developer forums as a faster source to download the 3Gb Xcode file.

The success of the XCodeGhost phish is staggering; that some 4,000 apps were hosed indicates that a lot of developers were sucked into what must have been a very well-executed attack by highly capable malefactors.

Veracode principal solutions architect John Smith said that the attack challenged the notion that iOS was safer than Android.

“In recent years it has seemed that the problem of mobile malware was bigger for Android than for iOS,” Smith said.

“The more rigorous testing regime required before an iOS app can be published has always been considered to be the reason for this difference, but in this case it seems to have fallen short.”

From an infection graph, it seems like it’s been going on for a while, since April 2015 at least – but there’s been a huge peak in infected apps in September.

It’s surprising that such a large number of apps were able to violate Apple’s stringent App Store policies for such an extended period of time.

Even then, it seems like the implementation of XcodeGhost isn’t that malicious and they aren’t sending much more than the original author intended.

Source: The Register

Posted in: Apple, Exploits/Vulnerabilities, Malware

, ,


Latest Posts:


CHIPSEC - Platform Security Assessment Framework CHIPSEC – Platform Security Assessment Framework For Firmware Hacking
CHIPSEC is a platform security assessment framework for PCs including hardware, system firmware (BIOS/UEFI), and platform components for firmware hacking.
How To Recover When Your Website Got Hacked How To Recover When Your Website Got Hacked
The array of easily available Hacking Tools out there now is astounding, combined with self-propagating malware, people often come to me when their website got hacked and they don't know what to do, or even where to start.
HTTrack - Website Downloader Copier & Site Ripper Download HTTrack – Website Downloader Copier & Site Ripper Download
HTTrack is a free and easy-to-use offline browser utility which acts as a website downloader and a site ripper for copying websites and downloading them for offline viewing.
sshLooter - Script To Steal SSH Passwords sshLooter – Script To Steal SSH Passwords
sshLooter is a Python script using a PAM module to steal SSH passwords by logging the password and notifying the admin of the script via Telegram when a user logs in.
Intercepter-NG - Android App For Hacking Intercepter-NG – Android App For Hacking
Intercepter-NG is a multi functional network toolkit including an Android app for hacking, the main purpose is to recover interesting data from the network stream and perform different kinds of MiTM attacks.
dcipher - Online Hash Cracking Using Rainbow & Lookup Tables dcipher – Online Hash Cracking Using Rainbow & Lookup Tables
dcipher is a JavaScript-based online hash cracking tool to decipher hashes using online rainbow & lookup table attack services.


Comments are closed.