That's not the ****ing point! The ****ing point is that Apple let those apps slip into the App Store!China...
Right? How hard is it to type apple.com and go from there?
What are Chinese developers doing making WinZip?
That is certainly one of the points, and perhaps one of the bigger ones, but it's not the only point.That's not the ****ing point! The ****ing point is that Apple let those apps slip into the App Store!
The fail is epic in this one...What a bunch of stupid developers. I want a list of their names so to never download anything from them again.
That is certainly one of the points, and perhaps one of the bigger ones, but it's not the only point.
So basically some lazy Chinese developers opened up a door through Apple security system....
Every time something wrong happens, Chinese are involved....
Changing iCloud password might be overreacting...
The design of iOS makes it impossible for third-party apps to access iCloud password when they prompt users to type the password, if the device is not jailbroken. Thus the only way a malware could get the password is make a fake pop-up window asking user to login iCould (developer can draw a pop-up window that looks exactly like the iCloud login, but send the password somewhere else). But there is another problem, on a non-jailbroken device, apps other than App Store itself cannot access the iCloud ID, the fake iCloud window must ask user to type the iCloud ID as well, while other legitimate iCloud access requests only ask for the password.
In this sense, unless you have seen some third-party app asking you to provide both iCloud ID and password, it's impossible for the breacher to get hold of your iCloud ID and password at the same time.
Like many others have commented I don't see how a 100 billion dollar company like Tencent "doesn't have the time" to download a working copy of XCode - heck even I've got one and I'm not even a real developer. Something very wrong about all of this. I don't believe that it's a time issue. I think there some other reason they were using X-code Ghost.
That's not the ****ing point! The ****ing point is that Apple let those apps slip into the App Store!
Sorry, but you missed the entire point! The point is not the source of the malware, but that the malware infected apps got into the App Store - through Apple's quality control! - in the first place!
That's the point of the story!
Sorry, but you missed the entire point! The point is not the source of the malware, but that the malware infected apps got into the App Store - through Apple's quality control! - in the first place!
That's the point of the story!
Infected iOS apps
网易云音乐 2.8.3
微信 6.2.5
讯飞输入法 5.1.1463
滴滴出行 4.0.0.6-4.0.0.0
滴滴打车 3.9.7.1 – 3.9.7
铁路12306 4.5
下厨房 4.3.2
51卡保险箱 5.0.1
中信银行动卡空间 3.3.12
中国联通手机营业厅 3.2
高德地图 7.3.8
简书 2.9.1
开眼 1.8.0
Lifesmart 1.0.44
网易公开课 4.2.8
马拉马拉 1.1.0
药给力 1.12.1
喜马拉雅 4.3.8
口袋记账 1.6.0
同花顺 9.60.01
快速问医生 7.73
懒人周末
微博相机
豆瓣阅读
CamScanner
CamCard
SegmentFault 2.8
炒股公开课
股市热点
新三板
滴滴司机
OPlayer 2.1.05
电话归属地助手 3.6.5
愤怒的小鸟2 2.1.1
夫妻床头话 1.2
穷游 6.6.6
我叫MT 5.0.1
我叫MT 2 1.10.5
自由之战 1.1.0
Fox-IT (fox-it.com), a Netherlands based security company, checked all C2 domain names from our reports in their network sensors and has found thousands of malicious traffic outside China. According to their data, these iOS apps were also infected:
Mercury
WinZip
Musical.ly
PDFReader
guaji_gangtai en
Perfect365
网易云音乐
PDFReader Free
WhiteTile
IHexin
WinZip Standard
MoreLikers2
CamScanner Lite
MobileTicket
iVMS-4500
OPlayer Lite
QYER
golfsense
同花顺
ting
installer
下厨房
golfsensehd
Wallpapers10000
CSMBP-AppStore
礼包助手
MSL108
ChinaUnicom3.x
TinyDeal.com
snapgrab copy
iOBD2
PocketScanner
CuteCUT
AmHexinForPad
SuperJewelsQuest2
air2
InstaFollower
CamScanner Pro
baba
WeLoop
DataMonitor
爱推
MSL070
nice dev
immtdchs
OPlayer
FlappyCircle
高德地图
BiaoQingBao
SaveSnap
Guitar Master
jin
WinZip Sector
Quick Save
CamCard
How does Tencent, a 160 billion dollar company, download its Xcode from a third party repository?
Why can't Apple sign the Xcode so it will only work if it's downloaded from Apple servers ?
Seriously. I've been wondering for over a month now how someone accessed one of my accounts when I tend to be very careful. Apparently logging into said account using Mercury was the origin of the breach. I utilized the ad blocking and image blocking features to browse when in areas with poor internet speeds.Mercury - if it is the web browser - that is huge. Mercury is on a lot of devices.
How does Tencent, a 160 billion dollar company, download its Xcode from a third party repository?
Maybe their internet makes accessing Apple.com becomes a super hard task.China...
Right? How hard is it to type apple.com and go from there?
Thank you for the helpful info. I had the infected camcard on my iPhone. I've uninstalled it and also change my iCloud password. Just to be safe. So were clear, I don't to change any other passwords?
From: "admin" <apple@apple.com>
Reply-To: app1e@apple.com
Subject: Your Apple ID Report
Return-Path: bounce@shoppper.top
Received: from mail1.shoppper.top (unknown [94.156.77.185]) ...
Dear Customer,
Recently we posted the initial analysis report on XcodeGhost malware and then we found it had infected 39 iOS apps, potentially impacting hundreds of millions of users.
This server performs the following actions:
Read and write data in the user’s clipboard, which could be used to read the user’s password.
According to one developer’s report, XcodeGhost has successfully stolen over 225,000 valid Apple accounts and thousands of certificates, private keys, and purchasing receipts.
We need to verify that this email address belongs to you and that your Apple ID account can't be used by anyone else in order to abuse it.
Your email address cannot be used as a contact address for an Apple ID without this authentication.
Please fill out the required informations honestly and thoroughly in order to continue using your Apple ID account.
Simply click the link below and sign in using your Apple ID and password.
Verify Now
For more information, see our frequently asked questions.
Thanks,
Apple Customer Support
TM and copyright © 2015 Apple Inc. 1 Infinite Loop, MS 96-DM, Cupertino, CA 95014.
All Rights Reserved / Keep Informed / Privacy Policy / My Apple ID
There is something not quite right about this list from Fox-IT. I checked six random apps on the list and every one is still available in the App Store and has not been recently updated.
Now that Apple has made a statement that they have removed the offending apps this means either:-
a) Fox-IT's list is wrong.
b) Apple is lying that they have removed the rogue apps (or maybe the Marketing Dept got ahead of themselves).
c) Apple has missed some of them, but somebody at Apple must have seen this list too.
Only a fool would believe that iOS or any other mobile/desktop OS is 100% safe from malware and I don't recall Apple saying that iOS was 100% safe from malware. If they did, shame on them. So it's probably better to avoid any apps developed in China, at least until Apple does something to prevent this from happening in the future.