{"id":76584,"date":"2014-11-10T21:15:03","date_gmt":"2014-11-10T19:15:03","guid":{"rendered":"http:\/\/onsoftware.en.softonic.com\/?p=76584"},"modified":"2025-07-02T00:21:54","modified_gmt":"2025-07-02T07:21:54","slug":"masque-attack-ios-security-flaw","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/masque-attack-ios-security-flaw\/","title":{"rendered":"&#8216;Masque Attack&#8217; security flaw lets hackers replace your iOS apps with malicious ones"},"content":{"rendered":"<p>Security research firm FireEye published a report today about a new iOS vulnerability that <strong>allows attackers to replace your apps with ones that steal your information<\/strong>. FireEye reported the security flaw to Apple on July 26th urging the company to patch it.<\/p>\n<p>This attack, named <strong>Masque Attack<\/strong> by FireEye, uses <strong>forged bundle identifiers<\/strong> to lure unsuspecting iOS users into installing fake apps. Since iOS doesn&#8217;t check for matching certificates for apps with the same bundle identifier, the app is installed without issue.<\/p>\n<p><!-- Start of Brightcove Player --><\/p>\n<div>\nDefault player\n<\/div>\n<p><!--\nBy use of this code snippet, I agree to the Brightcove Publisher T and C \nfound at https:\/\/accounts.brightcove.com\/en\/terms-and-conditions\/. \n--><\/p>\n<p><object><\/object><\/p>\n<p><!-- \nThis script tag will cause the Brightcove Players defined above it to be created as soon\nas the line is read by the browser. If you wish to have the player instantiated only after\nthe rest of the HTML is processed and the page load is complete, remove the line.\n--><br \/>\nbrightcove.createExperiences();<\/p>\n<p><!-- End of Brightcove Player --><\/p>\n<p>FireEye used a phishing text message to demonstrate how Masque Attack works. If a user taps on the download link in the phishing text, the user will see a pop up asking if they want to install the app. Attackers can name the app anything they want and in this case, FireEye named the fake app &#8220;New Flappy Bird.&#8221;<\/p>\n<p>Once the user taps &#8220;Install&#8221;, <strong>the app will replace the legitimate app<\/strong> and the user will be none the wiser. The demonstrated app is a fake version of <a title=\"Gmail for iOS\" href=\"http:\/\/gmail-1.en.softonic.com\/iphone\" target=\"_self\" rel=\"noopener noreferrer\">Gmail<\/a> that looks just like the official app but secretly sends all of a user&#8217;s emails to the hacker.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-76588\" title=\"Masque Attack stolen email\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2014\/11\/stolen-email-568x242.jpg\" alt=\"stolen email\" width=\"568\" height=\"242\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2014\/11\/stolen-email-568x242.jpg 568w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2014\/11\/stolen-email-256x109.jpg 256w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2014\/11\/stolen-email.jpg 1534w\" sizes=\"auto, (max-width: 568px) 100vw, 568px\" \/><\/p>\n<p>The scariest thing about Masque Attack is that it <strong>works on non-jailbroken iPhones<\/strong>, which means all users running iOS 7.1.1 and up are affected. Even the <a title=\"iOS 8.1.1 will fix iPhone 4s and iPad 2 performance issues\" href=\"http:\/\/news.en.softonic.com\/ios-8-1-1-will-fix-iphone-4s-and-ipad-2-performance-issues\" target=\"_self\" rel=\"noopener noreferrer\">latest version<\/a> of iOS 8 isn&#8217;t safe. Masque Attack can replace any app downloaded from the App Store but not built-in apps like Safari.<\/p>\n<p>FireEye recommends users <strong>avoid installing anything outside of the official App Store<\/strong>. Users should also be aware when an &#8220;Install&#8221; pop-up is triggered from a web page. Lastly, if you see a warning which reads &#8220;Untrusted App Developer&#8221;, don&#8217;t install the app (duh).<\/p>\n<p>In addition to last week&#8217;s <a title=\"New iPhone malware spreads when connecting to a Mac\" href=\"http:\/\/news.en.softonic.com\/new-iphone-mac-malware\" target=\"_self\" rel=\"noopener noreferrer\">WireLurker<\/a> security vulnerability and now Masque Attack, iOS users are no longer as safe as <a title=\"Which is safest: Android, iOS or Windows Phone?\" href=\"http:\/\/features.en.softonic.com\/which-is-safest-android-ios-or-windows-phone\" target=\"_self\" rel=\"noopener noreferrer\">previously though<\/a>.<\/p>\n<p><em>Source: <a title=\"FireEye\" href=\"http:\/\/www.fireeye.com\/blog\/technical\/cyber-exploits\/2014\/11\/masque-attack-all-your-ios-apps-belong-to-us.html\" target=\"_blank\" rel=\"noopener noreferrer\">FireEye<\/a><\/em><\/p>\n<p><em>Via: <a title=\"9to5Mac\" href=\"http:\/\/9to5mac.com\/2014\/11\/10\/masque-attack-ios-security-flaw-wirelurker\/\" target=\"_blank\" rel=\"noopener noreferrer\">9to5Mac<\/a><\/em><\/p>\n<h3>Related Stories<\/h3>\n<p><a title=\"Computer security should be simple\" href=\"http:\/\/features.en.softonic.com\/computer-security-should-be-simple\" target=\"_self\" rel=\"noopener noreferrer\">Computer security should be simple<\/a><\/p>\n<p><a title=\"New iPhone malware spreads when connecting to a Mac\" href=\"http:\/\/news.en.softonic.com\/new-iphone-mac-malware\" target=\"_self\" rel=\"noopener noreferrer\">New iPhone malware spreads when connecting to a Mac<\/a><\/p>\n<p><a title=\"Worldwide governments made 24% more requests for user data in 2014\" href=\"http:\/\/news.en.softonic.com\/worldwide-governments-made-24-more-requests-for-user-data-in-2014\" target=\"_self\" rel=\"noopener noreferrer\">Worldwide governments made 24% more requests for user data in 2014<\/a><\/p>\n<p><a title=\"Windows malware threat Poweliks lives in Windows Registry\" href=\"http:\/\/news.en.softonic.com\/windows-malware-threat-poweliks-lives-in-windows-registry\" target=\"_self\" rel=\"noopener noreferrer\">Windows malware threat Poweliks lives in Windows Registry<\/a><\/p>\n<p style=\"text-align: right\"><em>Follow me on Twitter: <a href=\"https:\/\/twitter.com\/lewisleong\" target=\"_self\" rel=\"noopener noreferrer\">@lewisleong<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security research firm FireEye published a report today about a new iOS vulnerability that allows attackers to replace your apps with ones that steal your information. FireEye reported the security flaw to Apple on July 26th urging the company to patch it. This attack, named Masque Attack by FireEye, uses forged bundle identifiers to lure &hellip; <a href=\"https:\/\/cms-articles.softonic.io\/en\/masque-attack-ios-security-flaw\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;&#8216;Masque Attack&#8217; security flaw lets hackers replace your iOS apps with malicious ones&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2033,"featured_media":76587,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[],"tags":[],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-76584","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/76584","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/2033"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=76584"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/76584\/revisions"}],"predecessor-version":[{"id":329857,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/76584\/revisions\/329857"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/76587"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=76584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=76584"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=76584"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=76584"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=76584"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=76584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}