fbpx

YiSpecter Malware: No Apple User is Safe

Researchers on Monday discovered a new malware named YiSpecter which is effecting thousands of iPhones and iPads. Researchers of Palo Alto, a security firm first broke the news about the malicious malware which so far only effected Apple users from Taiwan and China. YiSpecter is the first of its kind malware because it is effecting both Jailbroken and Non-Jailbroken Apple devices, which is something researchers has never seen before.

This malware is so severe that it spreads via unusual means, including the hijacking of traffic from nationwide ISPs, an SNS worm on Windows, and an offline app installation and community promotion. Many victims have discussed YiSpecter infections of their jailbroken and non-jailbroken iPhones in online forums and have reported the activity to Apple.

The malware is infecting Apple devices since November 2014, but out of 57 security vendors in VirusTotal, only one is detecting the malware at the time of this writing. There are more than 100 apps in Apple’s App Store, which is infected with YiSpecter Malware. This is the first time any malware has bypassed the Apple’s notorious code reviews.

Some major attributes of YiSpecter Malware are: 

  • The malware can be downloaded and installed in your device regardless of the fact that its jailbroken or not. 
  • You cannot remove malware from your device once it is downloaded or installed. Even if you try to manually delete the malware it will re-appear on your device. 
  • Using third-party tools you can find some strange additional “system apps” on infected phones. 
  • Once YiSpecter Malware is installed in your device, normal apps start to show full screen advertisements when user try to open them. 

There is a malware named XcodeGhost which is similar to YiSpecter, these are the only malwares who effected non-jailbroken apple devices severally. But Plao Alto researchers believed that there is no connection between the developers of these malwares. However, YiSpecter is the first real world iOS malware that combines these two attack techniques and causes harm to a wider range of users. It pushes the line barrier of iOS security back another step.

So far there has been no statement released by the Apple regarding this news broken by Palo Alto researchers today.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...