Our global Cyber Awareness System focuses now on a family of malware targeting both Mac OS and iOS systems.
Each day comes with and reveals its batch of threats, techniques,
vulnerabilities and tools when it comes to computing security.
Now, Connectikpeople.co, soon #Retinknow talks about a new research paper , published by PaloAltonetworks on what they call ‘’WireLurker’’, a
family of malware targeting both Mac OS and iOS systems for the past six
months.
According to this report, WireLurker can monitor any iOS device connected
via USB with an infected OS X computer and installs downloaded third-party
applications or automatically generated malicious applications onto the device,
regardless of whether it is jailbroken.
We can also learn that, WireLurker can exhibit complex code structure,
multiple component versions, file hiding, code obfuscation and customized
encryption to thwart anti-reversing.
Therefore, Connectikpeople.co, soon #Retinknow encourages Enterprises to:
·
assure their mobile device
traffic is routed through a threat prevention system,
- Employ an antivirus or security protection product for the Mac OS X system and keep its signatures up-to-date
- ensure “Allow apps downloaded from Mac App Store (or Mac App Store and identified developers)”is set,
- Do not download and run Mac applications or games from any third-party app store, download site or other untrusted source
- Keep the iOS version on your device up-to-date
- Do not accept any unknown enterprise provisioning profile unless an authorized,
- Do not pair your iOS device with untrusted or unknown computers or devices
- Avoid powering your iOS device through chargers from untrusted or unknown sources
- Similarly, avoid connecting iOS devices with untrusted or unknown accessories or computers (Mac or PC)
- Do not jailbreak your iOS device; If you do jailbreak it, only use credible Cydia community sources and avoid the use or storage of sensitive personal information on that device.