Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
I have CamCard and actually used it. ****. Just exported everything and deleted the app.
 
What are Chinese developers doing making WinZip?

The magic keyword is: "outsourcing".

However sometimes the bill is higher than initially anticipated... but no worries: you generate a nice PowerPoint slide show, present it at the next stakeholder's meeting and be done with it.
 
That's not the ****ing point! The ****ing point is that Apple let those apps slip into the App Store!
That is certainly one of the points, and perhaps one of the bigger ones, but it's not the only point.
 
That is certainly one of the points, and perhaps one of the bigger ones, but it's not the only point.

Yeah, but you connect all the points and it spells out: "Apple's Mac App Store quality control failed big time!"
 
Changing iCloud password might be overreacting...

The design of iOS makes it impossible for third-party apps to access iCloud password when they prompt users to type the password, if the device is not jailbroken. Thus the only way a malware could get the password is make a fake pop-up window asking user to login iCould (developer can draw a pop-up window that looks exactly like the iCloud login, but send the password somewhere else). But there is another problem, on a non-jailbroken device, apps other than App Store itself cannot access the iCloud ID, the fake iCloud window must ask user to type the iCloud ID as well, while other legitimate iCloud access requests only ask for the password.

In this sense, unless you have seen some third-party app asking you to provide both iCloud ID and password, it's impossible for the breacher to get hold of your iCloud ID and password at the same time.

Wanna make a bet how many iPhone users would actually enter their iCloud password AND Apple ID, if shown with a "familiar looking dialog"?

And since you seem to be in the know, quick! Tell me what happens with the onscreen keyboard if a legitim password dialog shows up!

You didn't know the answer without actually trying it? See what I mean?

P.S. The keyboard gets dark which hints that a legitim password dialog is being shown...

P.P.S. And no, I never realised that myself before reading that tip here on the forums a couple of months ago...
 
Like many others have commented I don't see how a 100 billion dollar company like Tencent "doesn't have the time" to download a working copy of XCode - heck even I've got one and I'm not even a real developer. Something very wrong about all of this. I don't believe that it's a time issue. I think there some other reason they were using X-code Ghost.
 
  • Like
Reactions: KompleX and SHNXX
Like many others have commented I don't see how a 100 billion dollar company like Tencent "doesn't have the time" to download a working copy of XCode - heck even I've got one and I'm not even a real developer. Something very wrong about all of this. I don't believe that it's a time issue. I think there some other reason they were using X-code Ghost.

My feeling is that this is no accident at all. That this is one of those zillions of hacks the Chinese hack team (or whatever it has been called, remember the Obama Chinese meeting about this... It's not because it is a minor issue..) has been doing all over the last year. The whole scenario here makes NO SENSE OTHERWISE.
 
  • Like
Reactions: macgabe and SHNXX
Sorry, but you missed the entire point! The point is not the source of the malware, but that the malware infected apps got into the App Store - through Apple's quality control! - in the first place!

That's the point of the story!

The point appears to be whatever you want it to be, but it's worth bearing in mind that 'infected' is a strong word in this case. The infected apps don't really do anything that the iOS APIs don't already allow. The data these apps collect is data that Apple allows apps to collect. The malware isn't using any exploit or vulnerability in iOS. Even collecting clipboard data isn't sketchy - apps must be able to do it in order to function. So making a drama about this is being oblivious to the challenges. Apple cannot automatically detect and ban apps that collect freely collectible data.

Apple's deterrent against apps doing permitted-but-sketchy things like this, is the accountability of the developers. Each app on the App Store can be traced to a bank or credit account. It's not impossible to get bad code into the App Store - in fact its very easy - the difficult part is getting away with it afterwards. The problem here is relatively innocuous code with no chain of accountability can turn bad once it's on the phones and there's nobody to trace it to. Previously we have that chain of accountability. Here we don't.

It's difficult to know how to stop this. Even using only signed Xcode, negligent developers could still use bad plugins or bad code libraries or employ bad coders. For the moment, we have to rely on the appropriate action to be taken against the idiots (or 'bad actors') behind this, as deterrent for the same thing happening again.
 
  • Like
Reactions: SteveW928
Sorry, but you missed the entire point! The point is not the source of the malware, but that the malware infected apps got into the App Store - through Apple's quality control! - in the first place!

That's the point of the story!

NO ITS NOT THE POINT; It got in through Xcode, which is probably the reason it got in.
The fact that a mallware of Xcode was downloaded by multinationals from those hack sites instead of directly from Apple is beyond belief; something really weird went on there and I see Government hacker all over this crap.

There's a reason there has been a meeting between Obama and Chinese about this kind of thing and it is not because it doesn'T happen...
 
Infected iOS apps
网易云音乐 2.8.3
微信 6.2.5
讯飞输入法 5.1.1463
滴滴出行 4.0.0.6-4.0.0.0
滴滴打车 3.9.7.1 – 3.9.7
铁路12306 4.5
下厨房 4.3.2
51卡保险箱 5.0.1
中信银行动卡空间 3.3.12
中国联通手机营业厅 3.2
高德地图 7.3.8
简书 2.9.1
开眼 1.8.0
Lifesmart 1.0.44
网易公开课 4.2.8
马拉马拉 1.1.0
药给力 1.12.1
喜马拉雅 4.3.8
口袋记账 1.6.0
同花顺 9.60.01
快速问医生 7.73
懒人周末
微博相机
豆瓣阅读
CamScanner
CamCard
SegmentFault 2.8
炒股公开课
股市热点
新三板
滴滴司机
OPlayer 2.1.05
电话归属地助手 3.6.5
愤怒的小鸟2 2.1.1
夫妻床头话 1.2
穷游 6.6.6
我叫MT 5.0.1
我叫MT 2 1.10.5
自由之战 1.1.0

Fox-IT (fox-it.com), a Netherlands based security company, checked all C2 domain names from our reports in their network sensors and has found thousands of malicious traffic outside China. According to their data, these iOS apps were also infected:

Mercury
WinZip
Musical.ly
PDFReader
guaji_gangtai en
Perfect365
网易云音乐
PDFReader Free
WhiteTile
IHexin
WinZip Standard
MoreLikers2
CamScanner Lite
MobileTicket
iVMS-4500
OPlayer Lite
QYER
golfsense
同花顺
ting
installer
下厨房
golfsensehd
Wallpapers10000
CSMBP-AppStore
礼包助手
MSL108
ChinaUnicom3.x
TinyDeal.com
snapgrab copy
iOBD2
PocketScanner
CuteCUT
AmHexinForPad
SuperJewelsQuest2
air2
InstaFollower
CamScanner Pro
baba
WeLoop
DataMonitor
爱推
MSL070
nice dev
immtdchs
OPlayer
FlappyCircle
高德地图
BiaoQingBao
SaveSnap
WeChat
Guitar Master
jin
WinZip Sector
Quick Save
CamCard

There is something not quite right about this list from Fox-IT. I checked six random apps on the list and every one is still available in the App Store and has not been recently updated.

Now that Apple has made a statement that they have removed the offending apps this means either:-

a) Fox-IT's list is wrong.
b) Apple is lying that they have removed the rogue apps (or maybe the Marketing Dept got ahead of themselves).
c) Apple has missed some of them, but somebody at Apple must have seen this list too.
 
How does Tencent, a 160 billion dollar company, download its Xcode from a third party repository?

Because somewhere there is one guy sitting in an office and he decided to be lazy. Humans are always the weakest link.
 
Why can't Apple sign the Xcode so it will only work if it's downloaded from Apple servers ?

Apple DID sign Xcode, but the hackers don't need to modify the signed executable, nor libraries, to make their trick work. What they need to do is simply create a customized library within user workspace paths, and replace the default project template with one that will preload that customized library. The Apple's signature remains intact, but any new project created referring to that template will have malicious code injected by default.

Now let's assume that Apple had also sign the whole Xcode package and no one can modify anything within the Xcode package anymore. But Apple CAN'T forbid you to use 3rd-party libraries (for example, Unity) in your projects. The hackers could easily breach and distribute these 3rd-party libraries, and anyone who use these breached libraries will still have their compiled Apps infected. Different source, same result.

Technically, Apple CAN'T distinguish whether your App should or shouldn't do such things as collect user data and send back to some servers; it's possible that you're doing this intentionally, unless you've declared that your App is networking-less, such as flashlight. There is nothing wrong that an organization will ask their team members to use customized project template. And there is nothing wrong that an App will collect user data and send back for analyzing. If this package is distributed solely within one organization, to collect user data by default, as an enterprise policy, no one can complain that it would be a "problem" at all.
 
  • Like
Reactions: koyeung and mw360
Mercury - if it is the web browser - that is huge. Mercury is on a lot of devices.
Seriously. I've been wondering for over a month now how someone accessed one of my accounts when I tend to be very careful. Apparently logging into said account using Mercury was the origin of the breach. I utilized the ad blocking and image blocking features to browse when in areas with poor internet speeds.
 
Maybe Apple now wakes up and does 2 things for Chinese customers:
1) faster servers in China (take a cue from Microsoft!). It shouldn't take 24+ hours to download anything in the 2 - 5 gig range on a fiber connection in Shanghai.
2) revamp the App Store's connectivity to be more rugged. It's not fun to restart the entire download after a couple of hours just because there's some sudden connection reset the App Store cannot handle. Or to be stuck on "waiting" for hours...
 
How does Tencent, a 160 billion dollar company, download its Xcode from a third party repository?

Outsourced some work to a dude they found on a Chinese freelancer-site?
These days, the "supply chain" for most stuff is absolutely terrifyingly long and complex.
I bet, for the iPhone hardware - if printed out as a diagram - it would fill multiple A0 pages.
 
Thank you for the helpful info. I had the infected camcard on my iPhone. I've uninstalled it and also change my iCloud password. Just to be safe. So were clear, I don't to change any other passwords?

You only need to take precautions with accounts that you used with that app.

Did you login to another account whilst on that app?

If no, then you don't need to worry. At least, for this cause.
 
Has anyone received a scam email that builds on this?

From: "admin" <apple@apple.com>
Reply-To: app1e@apple.com
Subject: Your Apple ID Report
Return-Path: bounce@shoppper.top
Received: from mail1.shoppper.top (unknown [94.156.77.185]) ...


Dear Customer,

Recently we posted the initial analysis report on XcodeGhost malware and then we found it had infected 39 iOS apps, potentially impacting hundreds of millions of users.

This server performs the following actions:
Read and write data in the user’s clipboard, which could be used to read the user’s password.

According to one developer’s report, XcodeGhost has successfully stolen over 225,000 valid Apple accounts and thousands of certificates, private keys, and purchasing receipts.

We need to verify that this email address belongs to you and that your Apple ID account can't be used by anyone else in order to abuse it.
Your email address cannot be used as a contact address for an Apple ID without this authentication.

Please fill out the required informations honestly and thoroughly in order to continue using your Apple ID account.

Simply click the link below and sign in using your Apple ID and password.


Verify Now


For more information, see our frequently asked questions.

Thanks,
Apple Customer Support


TM and copyright © 2015 Apple Inc. 1 Infinite Loop, MS 96-DM, Cupertino, CA 95014.
All Rights Reserved / Keep Informed / Privacy Policy / My Apple ID

Note, I removed the URLs pointing to their faked Apple ID website. They point to (fortunately) now defunct shoppper.top website.
 
So a company "as big as WeChat" downloads a Xcode knock off from an unspecified server??? that goes a long way telling how "professional" they are.

That, or there is something fishy around this story....
 
There is something not quite right about this list from Fox-IT. I checked six random apps on the list and every one is still available in the App Store and has not been recently updated.

Now that Apple has made a statement that they have removed the offending apps this means either:-

a) Fox-IT's list is wrong.
b) Apple is lying that they have removed the rogue apps (or maybe the Marketing Dept got ahead of themselves).
c) Apple has missed some of them, but somebody at Apple must have seen this list too.

I've also had a look and some of the offending apps are still preset. Would love to know why that is, anyone got any ideas?
 
Only a fool would believe that iOS or any other mobile/desktop OS is 100% safe from malware and I don't recall Apple saying that iOS was 100% safe from malware. If they did, shame on them. So it's probably better to avoid any apps developed in China, at least until Apple does something to prevent this from happening in the future.

Well there is no shortage of fools in the world.
 
  • Like
Reactions: dampfnudel
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.