Scores Of iOS Apps ‘Vulnerable To HTTP Hijacking’

iPhone users could be in danger thanks to a simple flaw affecting a plethora of iOS applications, which attackers could leverage to send victims to whatever server they choose.

The problem lies in the 301 Moved Permanently HTTP standard response, which lets developers easily change the URLs apps use to update and is often used when domains need changing or websites are being merged.

Security firm Skycure discovered a man in the middle, an attacker sitting between the user and an application’s server, could use the 301 API vulnerability to return requests and replace URLs with malicious web addresses.

iOS threat

In many cases, during a Skycure test, iOS applications cached the malicious URL. That meant that even when the victim left the open network  and the man in the middle was nowhere to be seen, the app would still connect to the malicious server.

If a hacker could execute further code from the URL, they could gain further control of a victim’s iPhone.

Skycure said attacks exploiting this weakness would be “seamless”, as most mobile apps do not visually indicate the server they connect to, something that browsers do.

Worryingly for consumers, there appear to be only two ways to fix this: carry out a repeat attack to change the URL back to the legitimate server, or delete the app and re-download it – but that could mean losing any data in that app.

The attack method was labelled HTTP Request Hijacking and Skycure estimated 90 percent of iOS users run at least one vulnerable app on their device. It would not name vulnerable apps, due to concerns over exploitation in the wild.

“Attackers will start to infect people attack by attack,” said Adi Sharabani, Skycure’s CEO, during RSA Conference 2013, taking place in Amsterdam this week.

“They can later decide how to change flow and logic of attacks.

“Timing is very important to attackers. That’s why we’re very concerned about this.”

Research on Android apps has not been finalised yet, so it is not clear whether applications on Google’s platform are affected by the vulnerability.

What do you know about Internet security? Find out with our quiz!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

Apple Developing ‘LLM Siri’ AI For 2026

iPhone maker reportedly developing next-generation AI large language model for Siri for spring 2026 as…

28 mins ago

Hong Kong Research Group Trains AI Model With Huawei Chips

Hong Kong-based AI research institute uses Huawei Ascend 910B chips to train latest model, as…

58 mins ago

Investors Shocked As Temu Parent Misses Estimates

Temu and Pinduoduo parent company PDD Holdings misses analysts' estimates as economic slowdown in China…

1 hour ago

Apple, Google Mobile Ecosystems Should Be Investigated, CMA Told

CMA receives 'provisional recommendation' from independent inquiry that Apple,Google mobile ecosystem needs investigation

3 days ago

Australia Rejects Elon Musk Claim About Social Media Ban For Under-16s

Government minister flatly rejects Elon Musk's “unsurprising” allegation that Australian government seeks control of Internet…

3 days ago

Northvolt Files For Bankruptcy Protection In US

Northvolt files for Chapter 11 bankruptcy protection in the United States, and CEO and co-founder…

3 days ago