Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Quote below from a Reuters article today.

Apple Inc's chief marketing executive Phil Schiller said on Tuesday that the company plans steps to prevent further attacks on its App Store.

He said that Apple will offer domestic downloads of its developer toolkit from China, according to an interview with Chinese news site Sina.com.

Schiller also said that the company knows of no cases where tainted apps have been used to transmit customer data.

Apple plans to warn of 25 tainted apps that the company has identified so that customers can delete and update them, he said in the interview.
 
You forget one thing: 3rd-party libraries and frameworks, such as Unity. If the developer had included any breached 3rd party library, his App would still be injected.

There're hundreds of thousands of user created libraries out there and it's virtually impossible for Apple to prepare all these libraries on its cloud compiler. It's not even possible for Apple to make a whitelist for these 3rd party components.

It's not the first time that some 3rd party libraries were found to be vulnerable, or even breached, and a bunch of Apps were affected. Basically XcodeGhost is also a 3rd party library attack, since the hacker had done nothing but modified the default project template, to preload a block of codes before the "real" codes being executed.

Technically, XcodeGhost doesn't do anything "bad". An App is supposed to collect user data and send back for analyzing, especially for these which use internet services extensively. The only problem is that the customers, as well as creators, were unaware of such behavior.

Thanks to Apple's hysteria on privacy, these "malicious code" must still follow Apple's rule. It still can't savage your system, insert any executable. nor access anything you have not permitted. It can only collect very restricted, semi-anonymous information from your phone, without further permission. Now we all know why Apple behaved such a control freak.

Very true, I mean there is really no way I can think of for apple to prevent this (the cloud Idea was all I came up with and as you pointed out, it's not really feasible)


Perhaps all 3rd party libraries that will be supported on IOS need to be submitted to apple and signed by the original developer with their developer credentials, so any app uploaded for compile, would either use a "standard" well know library produced by a known developer OR a custom library from the app developer itself again signed by that developer.

Then if an legitimate app developer were to use a 3rd party library Xcode could check the signature with apples repository and alert the user whether a known good library is loaded or not. Of course a malicious app developer could still simply use or create a bad library, but this system would hopefully help prevent one bad library from affecting many developers unknowingly.
 
Quote below from a Reuters article today.
He said that Apple will offer domestic downloads of its developer toolkit from China, according to an interview with Chinese news site Sina.com.

That should have been done long time ago. It was missed by the upper mgmt who is in charge of China. How can they not know everything from china to the outside world is SLOW. (just try to share some photos via icloud and you will see).
 
What country and what version of Xcode? I recently switched, though I still develop for Android. So while I grant you Xcode is pretty damn slow to download, my SWAG is about an hour more. However the Android SDK is separate from Eclipse/IntelliJ, and that's taken a good deal of time on release days.
France, and that was like 6 years ago? iPhone 3G or 3GS back then, can't remember.
 
(# of total vulnerabilities, least to most)

Microsoft Windows : < 50
RIM Blackberry: ~ 60
Google Android: 54
Apple IOS: 692


sources: https://www.cvedetails.com/product/19997/Google-Android.html?vendor_id=1224

https://www.cvedetails.com/product/15556/Apple-Iphone-Os.html?vendor_id=49

12006098_427279277456073_1386736660474070503_n.jpg
So that explains stories after stories about Android exploits and fixes while almost none about iOS ones, right?
 
That is precisely why I hate looking for some guides on iOS development and they say "use this, get this library, do that blah blah". I am the type of coder that wants to do everything myself. For many reasons.
The only thing I use like that is MonoGame and Xamarin. Everything else I do by hand.

You must be on yourself or doing only independent projects, or you're a C-family programmer. :D

I'd also had the same habit like you when I was a young programmer, until I found it ultimately stupid to reinvent the wheel from ground zero.
 
You must be on yourself or doing only independent projects, or you're a C-family programmer. :D

I'd also had the same habit like you when I was a young programmer, until I found it ultimately stupid to reinvent the wheel from ground zero.

You don't learn if you use somebody else's code. For example, I recently started learning Direct X. There are A LOT of guides out there that use libraries that do everything for you. You don't get to learn about how to create a graphics device, or swap chains, or any of the necessary tasks.
 
You don't learn if you use somebody else's code. For example, I recently started learning Direct X. There are A LOT of guides out there that use libraries that do everything for you. You don't get to learn about how to create a graphics device, or swap chains, or any of the necessary tasks.

Good for you. Maybe you could start creating alternatives to Boost, OpenSSL, zlib, libcurl, lighthttpd, fastcgi, libpng and libmysqlclient.
 
Good for you. Maybe you could start creating alternatives to Boost, OpenSSL, zlib, libcurl, lighthttpd, fastcgi, libpng and libmysqlclient.

Try to get a job after all you do is download a library and use it. I have seen so many libraries that, if I used them, I could never explain HOW to do something in a job interview. I would just say "Download X and use it".

I am not saying you need to do everything yourself, stuff like Crypto you shouldn't do yourself. But it is irritating when asking, "how do I do this?" and people respond "just download this library". No.....I want to LEARN HOW coding this particular thing works.

There are so many developers out there that put code in their program and do not know how it works or what it even does.

I offer a lot of video tutorials, so that has a lot to do with it. I don't have to deal with other people's work in my tutorials (other than MonoGame and Xamarin).

Oh and I do not need all those things you listed for what I do.
 
I had winzip in my iPhone and iPad, but didnt use it.

I deleted the app as soon as I came to know about the risk.

Am I safe as I didnt open the app or I have to change all passwords entered in the iphone or ipad?
 
I had winzip in my iPhone and iPad, but didnt use it.

I deleted the app as soon as I came to know about the risk.

Am I safe as I didnt open the app or I have to change all passwords entered in the iphone or ipad?

It is still on the App Store, so it was probably safe from this anyway.
 
It is still on the App Store, so it was probably safe from this anyway.

there was an update for xcodeghost to it, but I preferred to delete the app.

my only issue remains is if we didnt open the app, are we safe?
coz I have entered a ton of passwords in the phone and it would be a huge hastle to change all of them :(
 
Infected iOS apps

CamCard


If you go to the App Store and Search on "CamCard":

1. It has NOT been pulled by Apple, nor updated since April.
2. There is a statement from the developer to the effect that they guarantee the current version of CamCard is not infected by XCodeGhost and that the report is wrong.

Not clear whether the report is totally wrong, or whether some ancient version was indeed infected.
 
I'm not sure why anyone would have to change all their passwords because of something like this.

If you're not doing good password management (i.e.: a good, strong, unique password for each service), then you won't have many to change. If you are doing such password management, then there is kind of a natural 'firewall' between each service anyway. At most, you'd just want to change a few critical ones (i.e.: Apple ID, email accounts... other things like bank codes aren't something you'd likely have been phished into entering into, for example, Angry Birds 2.)

Worst case, if you were using a compromised browser (i.e.: Mercury... which I'm not positive yet was compromised, or to what extent), you *might* have to change a few more critical things like bank accounts, or online services where things can be purchased against your desire. Most stuff we have passwords for wouldn't *that* critical if someone did somehow break into, and if you aren't using the same password anywhere else, it's a pretty easy fix.

I *strongly* recommend people use a good (local) password manager like PasswordWallet (by Selznick) or 1Password, and have a good backup AND archival strategy for the password data file. If you're doing that, you're pretty safe and really only need to worry about a few crucial accounts.
 
Last edited by a moderator:
Here's another analysis of XcodeGhost:

https://www.appthority.com/enterprise-mobile-threats/2015/09/21/xcodeghost-what-you-need-to-know/

They say they identified 476 affected apps. Their technical analysis is consistent with the alleged XcodeGhost source code that can be found on Github. In particular:

- XcodeGhost is not able to display fake password prompts. It can display an "OK/Cancel"-type dialog box only.
- It does not access the system clipboard. It only uses private pasteboards.
- The information it sent back to the C&C server (when it was still up) is device information. Many legitimate apps send back the same information as part of their analytics collection.
- It can send users to a specified URL, potentially including phishing sites on the Internet. However, that would be pretty obvious as the user would be switched to Safari.

Given all that they classify XcodeGhost as "adware" rather than "malware".
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.