{"id":4242,"date":"2014-06-24T10:41:04","date_gmt":"2014-06-24T14:41:04","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=4242"},"modified":"2020-02-26T15:09:33","modified_gmt":"2020-02-26T15:09:33","slug":"iphone-spyware","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/iphone-spyware\/4242\/","title":{"rendered":"Is Your iPhone Already Hacked?"},"content":{"rendered":"<p>It\u2019s a well-known fact that over <a href=\"https:\/\/www.securelist.com\/en\/analysis\/204792326\/Mobile_Malware_Evolution_2013\" target=\"_blank\" rel=\"noopener nofollow\">98% of smartphone<\/a> malware targets Android. This is due to the fact that user can only download iOS apps from the human-curated App store, and Apple does a pretty impressive job preventing malicious software from entering its store. However, it\u2019s focuses only on mass malware, which is intended to infect any user without exact targeting. The story is completely different when someone wants to spy on you personally. You don\u2019t have to be a criminal, an influential businessman or event political activist to become a subject of such spying. Maybe you fall into the \u201csuspicious\u201d or \u201cinteresting\u201d category by some other criteria, as we will see a little bit later. In this case, a spying agency can infect your iPhone too.<\/p>\n<p>In some countries, different government agencies are able to penetrate a suspect\u2019s computer or a smartphone for \u201cmonitoring\u201d purposes or evidence collection. To do this, agencies typically use so-called \u201clegal\u201d spyware. There are international companies officially developing and selling this kind of software. One of such companies is the Italian firm HackingTeam, which develops Remote Control System (RCS) software aka Galileo. Kaspersky Lab monitors RCS infrastructure for some time and encountered Windows malware \u201cimplants\u201d from RCS before. There were multiple hints in malicious files indicating the existence of smartphone \u201cimplants\u201d, but we did not have a chance to obtain them in the wild. During recent Kaspersky Lab research in partnership with Morgan Marquis-Boire from Citizen Lab, new variants of malware were discovered. These new samples are actually smartphone Trojans that work on both Android and iOS.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#Kaspersky Lab discovered #spying #Trojans that work on both #Android and #iOS<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F4cgE&amp;text=%23Kaspersky+Lab+discovered+%23spying+%23Trojans+that+work+on+both+%23Android+and+%23iOS\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<h2>iOS malware<\/h2>\n<p>The major new discovery during the current RCS research is the method used to infect iPhones. First, a victim\u2019s computer is infected with Windows or MacOS malware. The infection vectors are different each time and may include <a href=\"https:\/\/www.kaspersky.com\/blog\/social-engineering-hacking-the-human-os\/\" target=\"_blank\" rel=\"noopener nofollow\">social engineering tricks<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/exploit\/\" target=\"_blank\" rel=\"noopener nofollow\">exploits<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/phishing\/\" target=\"_blank\" rel=\"noopener nofollow\">spear phishing<\/a>. The malware silently sits in the computer, performs typical spying activities like <a href=\"https:\/\/www.kaspersky.com\/blog\/keylogger\/\" target=\"_blank\" rel=\"noopener nofollow\">keylogging<\/a> and waits until the victim connects his\/her smartphone to perform an iTunes sync. If a spyware operator approves a smartphone infection, a Trojan tries to silently <a href=\"https:\/\/threatpost.com\/tag\/jailbreak\" target=\"_blank\" rel=\"noopener nofollow\">jailbreak<\/a> a connected iPhone, followed by the installation of the mobile spying component. At this step, iPhone reboots and it\u2019s actually the only noticeable sign of anything going wrong. A malware is quite smart and uses multiple logical triggers to spy discretely, for example, works only when attacker-specified Wi-Fi network is nearby or a wall charger is connected. It does not cause major battery drain, which may alert a victim.<\/p>\n<div class=\"pullquote\">The iOS Trojan is smart and spies discretely, i.e. does not drain a battery.<\/div>\n<p>The RCS mobile Trojans are capable of performing all kinds of spying you can expect from such a tool, including location reporting, taking photos, spying on SMS, WhatsApp and other messengers, stealing contacts and so on.<\/p>\n<p>Of course, there are limitations that may or may not allow attackers to hack a specific iPhone. First, it must run a \u201cjailbreak-able\u201d iOS version. For example, there is no known jailbreak for the most recent version, but previous ones are vulnerable. Second, an iPhone should be passcode-unlocked during the jailbreak. However, both conditions are not rare and spyware operators no doubt have many iOS-running trophies.<\/p>\n<h2>Victims<\/h2>\n<p>The list of victims indicated in the new research, conducted by Kaspersky Lab and Citizen Lab, includes activists and human rights advocates, as well as journalists and politicians. However, the interest in some victims is unclear. One notable example is a high school history teacher in the UK.<\/p>\n<p>http:\/\/instagram.com\/p\/poDiSzP0I1\/<\/p>\n<p>The majority of the discovered RCS control servers were based in the United States, Kazakhstan, Ecuador, the UK and Canada. Sergey Golovanov, Principal Security Researcher at Kaspersky Lab, said: \u201cThe presence of these servers in a given country doesn\u2019t mean to say they are used by that particular country\u2019s law enforcement agencies. However, it makes sense for the users of RCS to deploy servers in locations they control \u2013 where there are minimal risks of cross-border legal issues or server seizures.\u201d<\/p>\n<h2>Protection<\/h2>\n<p>To avoid infection risks, Kaspersky Lab\u2019s experts recommend that you, first of all, don\u2019t jailbreak your iPhone, and secondly constantly update the iOS on your device to the latest version. In addition, running <a href=\"https:\/\/www.kaspersky.com\/advert\/free-trials\/multi-device-security?redef=1&amp;THRU&amp;reseller=blog_en-global\" target=\"_blank\" rel=\"noopener nofollow\">a robust security software<\/a> on your computer greatly reduces the risk of getting infected.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There were long time rumors about iPhone malware used to spy on smartphone owners, but now it\u2019s official \u2015Kaspersky Lab researchers discovered a real life sample of this Trojan. <\/p>\n","protected":false},"author":32,"featured_media":4243,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2026],"tags":[105,692,694,411,584,691,1150,26,36,43,693,44,690,689],"class_list":{"0":"post-4242","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-android","10":"tag-galileo","11":"tag-golovanov","12":"tag-government","13":"tag-great","14":"tag-hackingteam","15":"tag-ios","16":"tag-iphone","17":"tag-malware-2","18":"tag-privacy","19":"tag-rcs","20":"tag-smartphone","21":"tag-spying","22":"tag-spyware"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/iphone-spyware\/4242\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/iphone-spyware\/3649\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/iphone-spyware\/3548\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/iphone-spyware\/3999\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/iphone-spyware\/4406\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/iphone-spyware\/5184\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/iphone-spyware\/3246\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/iphone-spyware\/3456\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/iphone-spyware\/4046\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/iphone-spyware\/4406\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/iphone-spyware\/5184\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/iphone-spyware\/5184\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=4242"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4242\/revisions"}],"predecessor-version":[{"id":19042,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4242\/revisions\/19042"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/4243"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=4242"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=4242"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=4242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}