Time
3 hours 58 minutes
Difficulty
Beginner
CEU/CPE
4

Video Transcription

00:02
Now let's look at some instances of past iPhone hour. We'll begin by having a look at our timeline, and I just wanted to really point outs of interesting techniques used by our authors to infect iPhones. With Mauer. The 1st 1 will look at is Our Ikey malware in 2009 this mellow would install on jailbroken devices and take advantage of the default root password of
00:21
Alpine
00:22
to install malware remotely. Once infected the devices home Springboard image was changed to Rick Astley, so that was pretty interesting. In 2014 the wire lurker malware This abused 1/3 party application website to Trojan Eyes OSX applications.
00:40
Once the OS X application was installed,
00:43
the Miller would then monitor the USB device connection. Install malware on non jailbroken devices.
00:49
In 2015 we have the X Code ghost malware. This made use of a software bug in the X Code application compiler them. Our actor then distributed the Pirated version of X Code to other developers, which they used to submit malicious applications to the APP store.
01:07
This was unknowingly to the developers.
01:08
This will happen in China, and then, when the user's downloaded the application. They became infected.
01:15
In 2016 the A's deceiver malware used the third party desktop application to bypass certain data rights management restrictions. This installed malicious abs on non jailbroken devices and intercepted apple ideas and log in information.
01:32
So there you are. There's a few instances of malware in the past that have been targeting IOS devices. Now remember, IOS Malware only makes up about 1% of the total malware infections.
01:42
But you know, as new techniques are invented by, um, our authors every day, it's a possibility that this number could increase.
01:49
Now, how are these devices getting infected? Well, IOS attack vectors are similar to the ones with furiously mentioned. But because IOS devices have a pretty good security model, in my opinion, Mauer authors need to come up with some pretty inventive ways to attack devices.
02:05
Usually, these techniques are implemented using a bit of social engineering, as the Mauer might require a user to install an app from 1/3 party Web site or something similar. The most traditional attack vectors make use of software vulnerabilities to perform malicious activities like the jailbreak in the A P I abuse. But what about the APP store,
02:24
you may ask yourself, Well, how are these ABS are making their way into the APP store? It's crazy.
02:30
Well, there's a couple of ways that this may be happening. The first could be that the Mau authors downloaded these APS. They're unpacking them, inserting their malicious code into them and then re packing them and submitting them using the same name. The code in it just may be so subtle enough that it's getting past the code reviews.
02:46
Also, it could be that the APP is that repacked, and it just has a connection that's gonna download something additional. In the case of enterprise certificates, enterprise certificates are used by companies that wish to distribute applications to large corporations or a lot of users. But to get one of these, that only does it cost about $300.
03:06
But it also takes a phone call of Apple. They're trying to vet the companies.
03:09
In some malicious instances, we've seen malicious authors who by the Certs they distribute their Mauer and then seemingly just go out of business.
03:17
One of the first questions we should ask ourselves is why we looking at this malware, really, this is the first stage of arm our analysis. It's our initial analysis. If we know some of the details on how we got the Mauer, then it might help us during our basic analysis or even throughout the entire analysis process.
03:35
Unfortunately, though, sometimes we have to go in blind, right?
03:38
We may not know anything about them. Our this could be hiccough thing, or it could be a bad thing. But sometimes a lack of information could be just as important as what we have already attained. All the steps we take, however, typically accomplish the same thing. We want to try to uncover static artifacts like U R L. C two's names of libraries, file pats,
03:59
et cetera, to create some type of hypotheses that we can test out later. But again, remember, the path you take will really be determined heavily on your analysis schools.

Up Next

Mobile Malware Analysis Fundamentals

In the Mobile Malware Analysis Fundamentals course, participants will obtain the knowledge and skills to perform basic malware analysis on mobile devices. Participants will perform these tasks by learning and implementing tools and techniques while examining malicious programs.

Instructed By

Instructor Profile Image
Brian Rogalski
CEO of Hexcapes
Instructor