SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : Apple Product Help -- Ignore unavailable to you. Want to Upgrade?


To: engineer who wrote (6433)2/13/2024 5:47:57 PM
From: Zen Dollar Round  Respond to of 6556
 
There aren't any apps like that I'm aware of. Unlike on a Mac, PC, or Android devices, iOS apps are vetted by both automated processes and humans unless you jailbreak your device and install apps from elsewhere.

All the security apps for iOS are just password/VPN/WiFi scanners and don't scan for viruses or malware. There has never been an iOS virus to my knowledge, you're only at risk for security holes (many are made by highly financed state actors) until they are found and patched. A security app would never find those anyway, so your defense is to stay up-to-date with iOS. Same is true for computers.

There have been a few cases of bad apps making their way onto the App Store over the years, but once found and reported, they are removed by Apple.

One group of apps years ago was developed with a compromised version of Xcode in China that wasn't downloaded from Apple, but I think those apps were only on the Chinese version of the App Store.

A recent one was a case of an app developer mimicking the LastPass password app with a similar icon and functionality, but LastPass reported it to Apple and it was taken down.

I'm not sure what "corrupt files" you're concerned about. Every app has its own files and setting stored with it and deleting the app also deletes those files. Then just reinstall the app.



To: engineer who wrote (6433)2/16/2024 10:10:46 PM
From: Zen Dollar Round  Read Replies (1) | Respond to of 6556
 
Here you go, this is from today:

GoldPickaxe Trojan horse hits iPhones

Some nasty Trojan horse malware targets victims using iPhones through Apple’s TestFlight and MDM capabilities (not through the App Store).
First ever iOS trojan discovered — and it’s stealing facial recognition data to break into bank accounts

One of the reasons many people pick one of the best iPhones over their Android counterparts is due to security. However, that could be changing as the first ever banking trojan designed to target iPhone users has been spotted in the wild. According to a new report from Group-IB, the Android trojan GoldDigger has now been modified with new capabilities that make it easier for this malware to drain victims’ bank accounts
Face Off

GoldPickaxe.iOS, Group-IB researchers found, is capable of collecting facial recognition data, identity documents, and intercepting SMS. Its Android sibling has the same functionality but also exhibits other functionalities typical of Android Trojans. To exploit the stolen biometric data, the threat actor utilizes AI-driven face-swapping services to create deepfakes. This data combined with ID documents and the ability to intercept SMS, enables cybercriminals to gain unauthorized access to the victim’s banking account – a new technique of monetary theft, previously unseen by Group-IB researchers in other fraud schemes.

The newly identified GoldPickaxe.iOS employs a notable distribution scheme. The threat actor utilized Apple’s mobile application testing platform, TestFlight, to distribute malware initially. Following the removal of its malicious app from TestFlight, the threat actor adopted a more sophisticated approach. They employed a multi-stage social engineering scheme to persuade victims to install a Mobile Device Management (MDM) profile. This allowed the threat actor to gain complete control over the victim’s device.