iOS Vulnerability Leaves iPhones Open To ‘Invisible Malicious Profiles’

A weakness in Apple’s iOS operating system could allow an attacker to spy on a victim’s phone and hide their illicit activity, using what are known as “invisible malicious profiles”.

In the basic threat, detailed last year, hackers trick users into downloading configuration profiles, XML files that contain settings to manage various iOS functions, including Wi-Fi and email.

But two “evolutions” of this threat were discussed by Israeli security firm Skycure at RSA 2014 conference today, one of which made the profiles invisible to the naked eye. Normally, a user can simply go to their profiles settings and delete any malicious ones, but a vulnerability in iOS could be exploited to make them invisible.

The invisible iOS threat

Yair Amit, chief technology officer and co-founder of Skycure, would not go into detail on how to exploit the flaw, other than to say Apple was working on a fix, which will likely appear in iOS 7.1. Apple had not responded to a request for comment at the time of publication.

The tech titan was told about the flaw back in September and it was hoped a patch would be issued in time for RSA 2014. But no fix has yet emerged, despite recent updates to iOS.

The threat of malicious profiles, which have been seen in attacks by genuine online criminals, could be nasty. They could be used to install root certificates on a device, allowing the attacker to snoop on content ostensibly protected by SSL encryption.

It would be feasible for a hacker to completely compromise Facebook, LinkedIn, mail and bank identities used by the target by stealing their credentials.

“We’ve seen attackers spread malicious profiles through email but also through websites. That is very effective. They impersonate legitimate services,” Amit told TechWeekEurope.

The other “evolution” of the threat involved the bypassing of mobile device management (MDM) systems, traditionally used as a protective measure against app-based attacks. Even if the ProfileList MDM command is used, in an attempt to remotely query the installed profiles on a device, the malicious configuration file remains invisible.

“Even when you use MDM to query installed profiles, you don’t see that. It looks like nothing is there, but the attack persists,” Amit said.

“An attacker could also impersonate the MDM server… because of the capabilities of MDM, as an attacker I can do some cool stuff, like query information from the device or even remotely wipe it when I want.”

The only way a user could feasibly get rid of the profile would be to reset a device to factory settings, according to Skycure.

It’s been a bad week for Apple’s security team, as it faced criticism over a nasty SSL encryption weakness that allowed hackers to easily spy on users.

Are you a security expert? Try our quiz!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

UK CMA Seeks Feedback On Microsoft, Amazon AI Partnerships

British regulator invites feedback on major partnerships Microsoft and Amazon have struck with smaller AI…

11 hours ago

Google Fires More Staff Over Israel Protest

Another 20 staff have been fired by Google over Israel protest and their “completely unacceptable…

12 hours ago

Australian PM Hits Out At Elon Musk Over Knife Attack Video

Censorship row brewing down under, after the Australian Prime Minister calls Elon Musk an 'arrogant…

13 hours ago

US SEC Seeks $5.3 Billion Fine From Terra’s Do Kwon

Financial regulator asks New York judge to impose $5.3 billion in fines against Terraform Labs…

14 hours ago

Microsoft Launches Smallest AI Model, Phi-3-mini

Lightweight artificial intelligence model launched this week by Microsoft, offering more cost-effective option for Azure…

17 hours ago

US Senate Passes TikTok Ban Or Divestment Bill

ByteDance protest falls on deaf ears, as Senate passes TikTok ban or divest bill, with…

18 hours ago