I recently discovered a serious vulnerability in Apple's iOS 9. This means that the difficulty can be even hundreds of millions of mobile devices! And that's not all.

Everything should be SideStepper that allows an attacker to bypass security in iOS 9, to protect against harmful installing business applications. These safeguards make that to install the application, you must take some extra steps, related to verification of the certificate application developers. As a result, random install the malicious application is less likely. It is, however, an exception to this rule: if the application is installed via the MDM (Mobile Device Management), this new security are not used. The attacker can take control of the connection and simulate the iOS device correct MDM commands, such as instructions for application deployment signed certificates developers of business software. According to estimates, up to 79% of the 1.2 billion iPhone and iPad uses iOS 9. We can therefore speak of a threat to hundreds of millions of devices! During the conference, Black Hat Asia Check Point conducted a simulation showing how attackers can install malicious applications on diverse functionality. Check Point announced the company from Cupertino about the vulnerability of safety soon after the discovery – in October 2015, however, Apple acknowledged that "this is a clear example of a phishing attack (…) nothing to do with vulnerabilities in iOS" and so far does not intend to make security updates.

How to recognize an attack?

Without installed on your iOS sophisticated software for detection and neutralization of attacks against mobile devices, you probably do not realize that there was a successful attack. In a managed device running iOS commands from the MDM system they are regarded as trustworthy. The user seems to have come from the MDM system, and so the whole process takes place as if it were authentic.

What we are in danger?

The attacker has at its disposal a number of different commands MDM; their effects can only be a nuisance, but they can also be used to steal data. Because iOS treats malicious applications as trusted applications, and the installation process is well known to the user, the infection is immediate and visible. This gap poses a serious threat to the user and the security of sensitive data, even allowing eavesdropping on conversations in the vicinity of the device. Malware can:

  • upload screenshots;
  • record keystrokes, resulting in the disclosure of user credentials in private and corporate applications and websites;
  • record and send to the server controlled by the attacker confidential information, such as documents and images;
  • remotely control the camera and microphone, giving the attacker access to audio and video recorded by the device.

How to defend?

To minimize the risk, Check Point recommends:

  • recommend to the employer to install solutions guarding mobile security, detection and disposer advanced threats;
  • before installing any application carefully check whether it comes from a valid source;
  • contact the department responsible for mobile devices, IT or security and find out what steps have been taken to protect mobile devices, which this department manages;
  • use monitoring mobile device security solution, allowing to detect harmful programs.