Saturday, November 15, 2014

Apple iOS "Masque Attack"

1. An app installed on an iOS device using this technique may:
Mimic the original app’s login interface to steal the victim’s login credentials.
2. Access sensitive data from local data caches.
3. Perform background monitoring of the user’s device.
4. Gain root privileges to the iOS device.
5. Be indistinguishable from a genuine app.
Systems Affected
iOS devices running iOS 7.1.1, 7.1.2, 8.0, 8.1, and 8.1.1 beta.

No comments:

Post a Comment