Impact
1. An app installed on an iOS device using this technique may:
Mimic the original app’s login interface to steal the victim’s login credentials.
2. Access sensitive data from local data caches.
3. Perform background monitoring of the user’s device.
4. Gain root privileges to the iOS device.
5. Be indistinguishable from a genuine app.
1. An app installed on an iOS device using this technique may:
Mimic the original app’s login interface to steal the victim’s login credentials.
2. Access sensitive data from local data caches.
3. Perform background monitoring of the user’s device.
4. Gain root privileges to the iOS device.
5. Be indistinguishable from a genuine app.
Systems Affected
iOS devices running iOS 7.1.1, 7.1.2, 8.0, 8.1, and 8.1.1 beta.
iOS devices running iOS 7.1.1, 7.1.2, 8.0, 8.1, and 8.1.1 beta.
No comments:
Post a Comment