Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Why can't Apple sign the Xcode so it will only work if it's downloaded from Apple servers ?

How, exactly, do you think that would possibly work? HTTP is intentionally a dumb, stateless protocol. It's true OS X does some rudimentary tracking, but a) that's likely easily forged and b) you can only protect a user from himself so much.

Apple can (and does) sign the Xcode app, but if users choose to run modified versions of it there's not a lot Apple can do about it.
 
They should ban their in-house teams from throwing up a password request box. Absolute ban. It has got out of hand recently with stock apps asking for the password without any justification or explanation and pretty much at random. I've said it over and over, Apple have been training their users for exactly this scenario - enter password whenever anyone asks. If an app needs the iCloud password it should instruct the user to enter it in the appropriate settings page. Train users: only the settings app should be trusted with passwords.
That is an excellent proposal. I can't count how often I was asked to enter my iCloud password out of nowhere, even without any indication of what exactly was requesting it and for what purpose ...
 
I'm still using the Mercury Browser. Do I have to change every single password I've ever typed on my iPhone?

That's unacceptable.
 
So the only real attack here seems to be stealing iCloud password through the pop ups and then anything in the pasteboard?

If that is it then it is not as bad as I first thought, 2 step verification on your Apple ID solves he first problem. Then you just need to change any passwords you keep in a password manager. Or any that might have been on the pasteboard...

Might be missing something here but is that it?
 
I'm still using the Mercury Browser. Do I have to change every single password I've ever typed on my iPhone?

That's unacceptable.
Are we sure they are speaking about Mercury browser? There are other Mercury apps in the store...
 
  • Like
Reactions: int79
I'm still using the Mercury Browser. Do I have to change every single password I've ever typed on my iPhone?

That's unacceptable.

I think you might only need to change any passwords you have entered into pop ups like the ones asking for iCloud passwords. And any passwords you have copied into the clipborad at some point. So not neciserally every password that you use on your iOS device.

But I'm not certain about any of that, so please wait for someone who knows more. And like you I'm interested to know for sure the answer to that question!
 
Are we sure they are speaking about Mercury browser? There are other Mercury apps in the store...

Also another question I'm really intrigued to know the answer to! Mercury the browser is the only infected app I've ever used in the list. And I hope they were taking about a different Mercury!
 
Why would anyone download Xcode from anyone other than directly from Apple? Even if the download is slower it can't be worth getting a compromised developer tool.
I agree, but sometimes in China(it's China man!),the speed for downloading stuffs from Apple is < 50kB/s. Do the math. And sometimes even worse, it stops in the middle, no use if you pause and restart. That's China.
 
  • Like
Reactions: ackmondual
And how hard is it to actually read the original article, which addresses this?

Why would some Chinese developers download Xcode from Baidu?
Xcode is a large file that can take a long time to download from Apple's servers in China, leading some developers to download Xcode from unofficial sources.​

You make a petty excuse as a supposition to argument. Download the XCode package once from Apple secure servers. Share it on the internal network for all the Developers to install and move forward.

To worry and argue that you have not the time to spend in waiting for a slow download link to complete speaks volumes to how mismanaged your life must be.
 
How, exactly, do you think that would possibly work? HTTP is intentionally a dumb, stateless protocol. It's true OS X does some rudimentary tracking, but a) that's likely easily forged and b) you can only protect a user from himself so much.

Apple can (and does) sign the Xcode app, but if users choose to run modified versions of it there's not a lot Apple can do about it.
They could sign the app with an Xcode key, but if the compile is compromised then I'd have to think about whether that could be worked around. It may require OS X support for generating or testing the key (so Xcode doesn't just sign with a known good key)-- which could be compromised with an OS X hack.

One key to all of this is that the dev should have questioned why they needed to give special permission for Xcode to run. Any officially signed app should run without special permissions, and apps that aren't appropriately signed should require special intervention (right-click Open, or turning off Gatekeeper).
 
  • Like
Reactions: V.K.
Also another question I'm really intrigued to know the answer to! Mercury the browser is the only infected app I've ever used in the list. And I hope they were taking about a different Mercury!
Are we sure they are speaking about Mercury browser? There are other Mercury apps in the store...

I think you might only need to change any passwords you have entered into pop ups like the ones asking for iCloud passwords. And any passwords you have copied into the clipborad at some point. So not neciserally every password that you use on your iOS device.

But I'm not certain about any of that, so please wait for someone who knows more. And like you I'm interested to know for sure the answer to that question!

I'm not panicking yet but I hope we get clear answers to these questions. As a matter of fact, Mercury Browser is the main browser I use on my iPhone for quite some time so if it's affected I'm pretty screwed up by this.
 
  • Like
Reactions: int79
You make a petty excuse as a supposition to argument.

I don't. MacRumors did.

Download the XCode package once from Apple secure servers. Share it on the internal network for all the Developers to install and move forward.

Presumably, you know just as little as I do about the cultural realities over there in China. We don't know how much their firewall throttles or entirely blocks Apple's CDNs. We don't know how realistic your scenario is.

Nobody is arguing that downloading a piece of software from a third party without checking their trustworthiness is a smart move.
 
  • Like
Reactions: ackmondual
I keep getting emails about my cards being removed from apple pay but I didn't remove any cards and they are still on the phone. Could this be part of the malware problem too?
 
  • Like
Reactions: MacOG728893
I had CamScanner for some hours on one of my devices since there was a free sale in July. It wanted access to the contacts (I denied). It wanted that the user registers with the company INTSIG Information Co., Ltd. "for even better scan results" (I didn't register). The OCR worked pretty well from stock. I even recommended (with some warnings) the app to others in my blog but also mentioned that the dev tries everything to hide his provenience.

I'm awaiting eagerly an official statement by Apple in this case. As soon as possible and with a guide what's to do now. Btw the app is still available in the iOS App Store…
 
I'm not panicking yet but I hope we get clear answers to these questions. As a matter of fact, Mercury Browser is the main browser I use on my iPhone for quite some time so if it's affected I'm pretty screwed up by this.

Must admit, I did panick when I read the article at first, but rational thinking has prevailed. I use Mercury when I need to change the user agent, some 'mobile' websites are awful! So handy being able to set your browser to a desktop UA.

Are you kidding me? I keep 180+ passwords in a password manager, it'd take a month of Sundays to change them all!

Yea :/ can be a massive pain and I keep a fair few in a password manager. But it's all stuff I deem to not need high security like forums and other things like that.

Looks like anyone waiting for the 6S has got something to pass the time: change all of your passwords
 



xcode-6.png
Earlier this week, Chinese developers disclosed new iOS malware called XcodeGhost on microblogging service Sina Weibo. U.S. cybersecurity firm Palo Alto Networks has since published details about the malware.

MacRumors has created a FAQ so you can learn more about XcodeGhost and how to keep your iOS devices protected.

What is XcodeGhost?
XcodeGhost is a new iOS malware arising from a malicious version of Xcode, Apple's official tool for developing iOS and OS X apps.

How is XcodeGhost distributed?
A malicious version of Xcode was uploaded to Chinese cloud file sharing service Baidu and downloaded by some iOS developers in China.

Chinese developers then unknowingly compiled iOS apps using the modified Xcode IDE and distributed those infected apps through the App Store.

Those apps then managed to pass through Apple's code review process, enabling iOS users to install or update the infected apps on their devices.

Which devices are affected?
iPhone, iPad and iPod touch models running an iOS version compatible with any of the infected apps. The malware affects both stock and jailbroken devices.

Which apps are affected?
Palo Alto Networks has shared a full list of over 50 infected iOS apps, including WeChat, NetEase Cloud Music, WinZip, Didi Chuxing, Railway 12306, China Unicom Mobile Office and Tonghuashun.

How many users are affected?
XcodeGhost potentially affects more than 500 million iOS users, primarily because messaging app WeChat is very popular in China and the Asia-Pacific region.

Which unofficial versions of Xcode are affected?
All unofficial versions between Xcode 6.1 and Xcode 6.4.

How does XcodeGhost put my iOS devices at risk?
iOS apps infected with XcodeGhost malware can and do collect information about devices and then encrypt and upload that data to command and control (C2) servers run by attackers through the HTTP protocol. The system and app information that can be collected includes:

Current time
Current infected app's name
The app's bundle identifier
Current device's name and type
Current system's language and country
Current device's UUID
Network type

Palo Alto Networks also discovered that infected iOS apps can receive commands from the attacker through the C2 server to perform the following actions:

Prompt a fake alert dialog to phish user credentials;
Hijack opening specific URLs based on their scheme, which could allow for exploitation of vulnerabilities in the iOS system or other iOS apps;
Read and write data in the user's clipboard, which could be used to read the user's password if that password is copied from a password management tool.

Can XcodeGhost affect users outside of China?
Yes. Some of the iOS apps infected with XcodeGhost malware are available on the App Store in countries outside of China. CamCard, for example, is a popular business card reader and scanner app available in the United States and several other countries, while WeChat is a popular messaging app in the Asia-Pacific region.

Why would some Chinese developers download Xcode from Baidu?
Xcode is a large file that can take a long time to download from Apple's servers in China, leading some developers to download Xcode from unofficial sources.

How are Apple and Chinese developers dealing with XcodeGhost?
Palo Alto Networks claims that it is cooperating with Apple on the issue, while multiple developers have updated their apps to remove the malware.

How do I protect myself against XcodeGhost?
iOS users should immediately uninstall any infected iOS app listed here on their devices, or update to a newer version that has removed the malware. Resetting your iCloud password, and any other passwords inputted on your iOS device, is also strongly recommended as a precautionary measure.

Developers should install official versions of Xcode 7 or Xcode 7.1 beta from Apple's website for free and avoid downloading the software from unofficial sources.

Article Link: What You Need to Know About iOS Malware XcodeGhost
Do the apps need to be launched on the device, or simply installed? Are they able to launch background processes or any other sort of install scripts that can compromise a device?
 
/adjustmytinfoilhat...

Maybe it's been a known hack for a long time? Any agency could have been exploiting this for fun and profit for a long time.
EDIT sorry, misunderstood who was adjusting their hat!

I do think Apple should get on top of this fast - with the renewed focus on security, privacy and 'we care about your data' I'm expecting zero tolerance and a fast amendment to app store policies and signing.
 
Last edited:
Do the apps need to be launched on the device, or simply installed? Are they able to launch background processes or any other sort of install scripts that can compromise a device?

Would be nice to know once you delete an app if any residual code can be left on the device? I highly doubt that though thanks to iOS security
 
I'm not panicking yet but I hope we get clear answers to these questions. As a matter of fact, Mercury Browser is the main browser I use on my iPhone for quite some time so if it's affected I'm pretty screwed up by this.
I don't know either, but I suggest to assume it is the browser. Even though the developers apparently try to conceal their location (no address to be found anywhere on mercury-browser.com and ilegendsoft.com, and the domains are private registrations through Godaddy), the fact that there is a Chinese version of ilegendsoft.com is at least circumstantial evidence that they have a presence in China and may thus be affected.

Note that they also offer a password safe app. Wonder if that is affected too ...
 
I don't know either, but I suggest to assume it is the browser. Even though the developers apparently try to conceal their location (no address to be found anywhere on mercury-browser.com and ilegendsoft.com, and the domains are private registrations through Godaddy), the fact that there is a Chinese version of ilegendsoft.com is at least circumstantial evidence that they have a presence in China and may thus be affected.

Sorry if this is a stupid question but are both those domains you are talking about related to Mercury the browser? (ilegendsoft and Mercury-browser) Thanks
 
Ok - I really don't get Winzip being in this list. It's a company based in the USA and owned by Corel. Why on earth would they be downloading a dodgy version of Xcode from a Chinese file-sharing site!?!?!?! Only thing I can think of is they didn't do their own development and outsourced the iOS version to a dev in China? Until there's some sort of press-release from them I'm uninstalling it right now to be on the safe side.
 
No, it doesn't, because once Apple recognizes that kind of a problem, they can also fix it from that one central location. Without that "walled garden" approach, every user would now have to install a malware scanner and hope that it will get updated with profiles for the new malware.

How could Apple have avoided that situation? How did Apple betray its users? Apple did not force anyone to download a compromised Xcode version. The only "mistake" Apple made was not to recognize the malware in the review process. But that is hardly trivial.

Oh, no I just realized that you already said "I have no clue about the topic at hand, but I will make unfounded claims!"

Exactly. This +1. Gotta love people who admit they know zip, then go on to babble nonsense.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.