iOS用户通常只有将手机“越狱”——改变手机以运行未经苹果授权的软件,才能从第三方下载应用。被Wirelurker感染的应用能够通过受感染的Mac OS X系统侵袭尚未破解的手机,因此帕洛阿尔托网络公司的研究人员称,Wirelurker代表一种“针对所有iOS设备的新威胁”。
Researchers say that once WireLurker is installed on a Mac, the malware listens for a USB connection to an iOS device and immediately infects it. Once infected, WireLurker’s creators can steal a victim’s address book, read iMessage text messages and regularly request updates from attackers’ command-and-control server. Though the creator’s ultimate goal is not yet clear, researchers say the malware is actively being updated.
研究人员称,一旦WireLurker被安装到Mac电脑上,这款恶意软件就会等待用户通过USB连接iOS设备,然后立即感染该设备。一旦被感染,WireLurker的制造者就能窃取受害人的通讯簿、读取iMessage中的短信并定期从攻击者的指挥控制服务器发出更新请求。尽管尚不清楚制造者的最终目的,但研究人员称,有人正在积极更新该恶意软件。
“They are still preparing for an eventual attack,” said Ryan Olson, the director of threat intelligence at Palo Alto Networks. “Even though this is the first time this is happening, it demonstrates to a lot of attackers that this is a method that can be used to crack through the hard shell that Apple has built around its iOS devices.”
【恶意软件瞄准中国苹果设备用户】相关文章:
最新
2020-09-15
2020-09-15
2020-09-15
2020-09-15
2020-09-15
2020-09-15