iPhone developer site confirmed as corporate attack source
Contributed by: Email on 02/20/2013 04:01 PM [ Comments ]
Twitter, Facebook and now Apple have found company laptops infected with malware that exploits a Java zero-day. The malware's launching point for its drive-by attacks has been confirmed as a forum site for iPhone developers iphonedevsdk.com.
A report from Bloomberg says the site was identified by investigators as having been used for a "waterhole" attack, where users are drawn to the site in question because of its content. In this case, it appears the target was iOS developers who used the site's forums to discuss developing for Apple's devices. iPhoneDevSDK.com has confirmed that it was compromised and that a single administrator's account was used to modify the site's theme and add malicious java script to all the site's pages. The site says it believes the hacker removed the java script on 30 January and that it only found out it had been compromised when it was identified in an AllThingsD article which cited Facebook. Anyone who accessed the site is advised to check for malware on their systems.
Apple is the latest company to reveal that it has found malware on some employees' laptops, apparently delivered using those drive-by attacks. The methodology appears to be very similar to that which Facebook revealed it had been subject to in January. Apple gave no time frame for when it was attacked, but, according to Bloomberg's sources, Apple was actually the first to discover the attacks, ahead of Facebook. Investigators said they suspected that the attacks were the work of Eastern European criminals rather than any state-sponsored hacking group.
In a brief statement, Apple said it had "identified a small number of systems within Apple that were infected and isolated them from our network. There is no evidence that any data left Apple." Apple has also released an update to its Java 6 in Mac OS X which completely removes Java plugin support and directs users to Oracle for their Java 7 and plugin support. Oracle, who released an emergency patch for fifty vulnerabilities on 1 Feb in what appears to have been a response to the Facebook and Apple attacks has released an updated version of that emergency patch with a handful of critical holes also closed.
A report from Bloomberg says the site was identified by investigators as having been used for a "waterhole" attack, where users are drawn to the site in question because of its content. In this case, it appears the target was iOS developers who used the site's forums to discuss developing for Apple's devices. iPhoneDevSDK.com has confirmed that it was compromised and that a single administrator's account was used to modify the site's theme and add malicious java script to all the site's pages. The site says it believes the hacker removed the java script on 30 January and that it only found out it had been compromised when it was identified in an AllThingsD article which cited Facebook. Anyone who accessed the site is advised to check for malware on their systems.
Apple is the latest company to reveal that it has found malware on some employees' laptops, apparently delivered using those drive-by attacks. The methodology appears to be very similar to that which Facebook revealed it had been subject to in January. Apple gave no time frame for when it was attacked, but, according to Bloomberg's sources, Apple was actually the first to discover the attacks, ahead of Facebook. Investigators said they suspected that the attacks were the work of Eastern European criminals rather than any state-sponsored hacking group.
In a brief statement, Apple said it had "identified a small number of systems within Apple that were infected and isolated them from our network. There is no evidence that any data left Apple." Apple has also released an update to its Java 6 in Mac OS X which completely removes Java plugin support and directs users to Oracle for their Java 7 and plugin support. Oracle, who released an emergency patch for fifty vulnerabilities on 1 Feb in what appears to have been a response to the Facebook and Apple attacks has released an updated version of that emergency patch with a handful of critical holes also closed.
Comments