{"id":3270,"date":"2014-02-28T18:00:05","date_gmt":"2014-02-28T23:00:05","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=3270"},"modified":"2020-02-26T15:08:40","modified_gmt":"2020-02-26T15:08:40","slug":"keyboard-spies-now-on-iphones","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/keyboard-spies-now-on-iphones\/3270\/","title":{"rendered":"Keyboard Spies: Now on iPhones"},"content":{"rendered":"<p>Loyal Kaspersky Daily readers are already aware of the recent <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/critical-ios-macos-bug-can-can-expose-your-confidential-data-update-now\/\" target=\"_blank\" rel=\"noopener\">mobile security trends<\/a>: the hottest topic among cybercriminals are mobile banking Trojans. When you do your banking on a smartphone, thieves can intercept everything they need to steal from you \u2013 usernames, passwords, even one-time passwords being sent via text messages. However, until recently, these threats seemed to be relevant only to Androids \u2013 due to strict application restrictions in iOS and its curated app store, iPhone users rarely met mobile threats other than <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/kis-shines-in-independent-anti-phishing-testing\/\" target=\"_blank\" rel=\"noopener\">phishing<\/a>. Now it turns out that iOS is not that safe after all. The <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/critical-ios-macos-bug-can-can-expose-your-confidential-data-update-now\/\" target=\"_blank\" rel=\"noopener\">SSL bug dubbed \u201cgoto fail\u201d<\/a>, which is fixed in iOS 7.0.6, enabled hackers to intercept or modify the content of seemingly secure encrypted communications. But it\u2019s definitely not the end. A security company FireEye published the <a href=\"http:\/\/www.fireeye.com\/blog\/technical\/2014\/02\/background-monitoring-on-non-jailbroken-ios-7-devices-and-a-mitigation.html\" target=\"_blank\" rel=\"noopener nofollow\">research<\/a>, which describes the method of intercepting all keyboard- and touchscreen-related events in iOS, effectively making it possible to create a <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/keylogger\/\" target=\"_blank\" rel=\"noopener\">keylogger<\/a> on an iOS device <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/rooting-and-jailbreaking\/\" target=\"_blank\" rel=\"noopener\"><b>without<\/b> a jailbreak<\/a>.<\/p>\n<p>The principle is simple \u2013 a rogue application (it can disguise itself as something innocent, e.g. a music player) can enable background monitoring on the iOS 7 device and record all touchscreen events on the smartphone. Each event is a simple message like \u201cUser touched the screen at X, Y coordinates\u201d. As the iOS keyboard is 100% standard, it\u2019s easy to figure out which letter corresponds to these coordinates. The demo application, created by FireEye, sends the data to the remote server, where it is translated to actual keypresses, making hackers able to log all keystrokes on the iPhone. If you type your password, it will be immediately uploaded to the hackers\u2019 database, possibly leading to every negative consequence you can imagine. The app keeps monitoring users\u2019 keypresses even when the \u201cbackground app refresh\u201d is disabled in the iOS settings. To get rid of this spy, the user has to disable background monitoring and manually terminate all suspicious or unneeded apps via the task manager.<\/p>\n<div class=\"pullquote\">Another day, another round of bad news regarding iOS security. Tools particularly favored by cybercriminals and keyloggers have finally been developed for the seemingly secure operating system.<\/div>\n<p>Luckily, this flaw was discovered by responsible researchers, who immediately reported it to Apple and are now helping Cupertino fix the issue. However, the update is not yet available to end users as we write.<\/p>\n<p>Due to the restricted nature of the iOS platform, there is not much you can do about the vulnerability. The aforementioned technique is very inconvenient as it makes multitasking useless. There are some third-party keyboards with alternative keymaps in the App Store, so you can type sensitive data into these apps and copy-paste it to banking apps or sites. However, this won\u2019t guarantee the data\u2019s safety. To achieve much better protection, security measures should be implemented by the banks themselves. This is where Kaspersky Lab comes into play. A recently announced <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/introducing-kaspersky-fraud-prevention\/\" target=\"_blank\" rel=\"noopener\">Kaspersky Fraud Prevention platform<\/a> can be used to strengthen the defences of mobile banking apps by adding several security layers on top of existing banking app functionality. One of the layers is called Secure Keyboard and addresses the keylogger issue. If your banking app uses Secure Keyboard for sensitive data, letters on the screen are placed in a random order, making it impossible to translate keypress coordinates to a specific letter. This effectively renders the described technique useless, protecting your data from criminals.<\/p>\n<p><b><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/02\/05192258\/kfp-secure-keyb.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3958\" alt=\"kfp-secure-keyb\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/02\/05192258\/kfp-secure-keyb.png\" width=\"459\" height=\"814\"><\/a><\/b><\/p>\n<p>There are other technologies available that protect both desktop and mobile devices from financial threats; you can explore some of them on the <a href=\"https:\/\/www.kaspersky.com\/business-security\/fraud-prevention\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Fraud Prevention page<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Loyal Kaspersky Daily readers are already aware of the recent mobile security trends: the hottest topic among cybercriminals are mobile banking Trojans. When you do your banking on a smartphone,<\/p>\n","protected":false},"author":32,"featured_media":3271,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[93,1150,97],"class_list":{"0":"post-3270","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-cybercriminals","9":"tag-ios","10":"tag-security-2"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/keyboard-spies-now-on-iphones\/3270\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/keyboard-spies-now-on-iphones\/3026\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/keyboard-spies-now-on-iphones\/2926\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/keyboard-spies-now-on-iphones\/3311\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/keyboard-spies-now-on-iphones\/3955\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/keyboard-spies-now-on-iphones\/2850\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/keyboard-spies-now-on-iphones\/3955\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/keyboard-spies-now-on-iphones\/3955\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/cybercriminals\/","name":"cybercriminals"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3270","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=3270"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3270\/revisions"}],"predecessor-version":[{"id":18950,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3270\/revisions\/18950"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/3271"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=3270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=3270"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=3270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}