Georgia Tech: Major iOS Vulnerability Allows Bypass of Security Mechanisms

by anonymous on 2013-08-08 10:55:22

Apple's iOS is considered the most stable and secure platform, and iPhones and iPads have become the choice for mobile device users around the world. Although iOS is based on a Unix kernel, it is not invincible. However, compared to the Android platform, which is a breeding ground for malware, it seems you haven't heard of any fatal flaws in iOS that would open the door to malware.

Unfortunately, there is now bad news. The Information Security Center at Georgia Tech recently announced the discovery of a major vulnerability in iOS and published details about it. This vulnerability allows attackers to bypass Apple's security mechanisms, posing a significant security threat to the iOS platform.

Researchers from the center explained that the vulnerability allows attackers to hide malicious components to pass Apple's app review process and then quietly install them on iOS devices without the user noticing. In theory, third-party iOS apps like Facebook could also become carriers of this malware.

The research team demonstrated what they called the "conceptual attack" Jekyll II. The malicious software coding bypasses Apple's approval mechanism, allowing attackers to push malware and conduct remote attacks on iOS devices, send messages, take photos, send emails and text messages, and even attack other apps—all without requiring user permission.

Fortunately, this vulnerability has been fixed in iOS 7, and according to the news from Georgia Tech, Apple is actively working to address the issue. Regardless, this vulnerability is certainly enough to make Apple pause and reflect.