iOS Vulnerability Leaves iPhones Open To ‘Invisible Malicious Profiles’

A weakness in Apple’s iOS operating system could allow an attacker to spy on a victim’s phone and hide their illicit activity, using what are known as “invisible malicious profiles”.

In the basic threat, detailed last year, hackers trick users into downloading configuration profiles, XML files that contain settings to manage various iOS functions, including Wi-Fi and email.

But two “evolutions” of this threat were discussed by Israeli security firm Skycure at RSA 2014 conference today, one of which made the profiles invisible to the naked eye. Normally, a user can simply go to their profiles settings and delete any malicious ones, but a vulnerability in iOS could be exploited to make them invisible.

The invisible iOS threat

Yair Amit, chief technology officer and co-founder of Skycure, would not go into detail on how to exploit the flaw, other than to say Apple was working on a fix, which will likely appear in iOS 7.1. Apple had not responded to a request for comment at the time of publication.

The tech titan was told about the flaw back in September and it was hoped a patch would be issued in time for RSA 2014. But no fix has yet emerged, despite recent updates to iOS.

The threat of malicious profiles, which have been seen in attacks by genuine online criminals, could be nasty. They could be used to install root certificates on a device, allowing the attacker to snoop on content ostensibly protected by SSL encryption.

It would be feasible for a hacker to completely compromise Facebook, LinkedIn, mail and bank identities used by the target by stealing their credentials.

“We’ve seen attackers spread malicious profiles through email but also through websites. That is very effective. They impersonate legitimate services,” Amit told TechWeekEurope.

The other “evolution” of the threat involved the bypassing of mobile device management (MDM) systems, traditionally used as a protective measure against app-based attacks. Even if the ProfileList MDM command is used, in an attempt to remotely query the installed profiles on a device, the malicious configuration file remains invisible.

“Even when you use MDM to query installed profiles, you don’t see that. It looks like nothing is there, but the attack persists,” Amit said.

“An attacker could also impersonate the MDM server… because of the capabilities of MDM, as an attacker I can do some cool stuff, like query information from the device or even remotely wipe it when I want.”

The only way a user could feasibly get rid of the profile would be to reset a device to factory settings, according to Skycure.

It’s been a bad week for Apple’s security team, as it faced criticism over a nasty SSL encryption weakness that allowed hackers to easily spy on users.

Are you a security expert? Try our quiz!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

Apple, Google Mobile Ecosystems Should Be Investigated, CMA Told

CMA receives 'provisional recommendation' from independent inquiry that Apple,Google mobile ecosystem needs investigation

22 hours ago

Australia Rejects Elon Musk Claim About Social Media Ban For Under-16s

Government minister flatly rejects Elon Musk's “unsurprising” allegation that Australian government seeks control of Internet…

1 day ago

Northvolt Files For Bankruptcy Protection In US

Northvolt files for Chapter 11 bankruptcy protection in the United States, and CEO and co-founder…

1 day ago

UK’s CMA Readies Cloud Sector “Behavioural” Remedies – Report

Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector

2 days ago

Former Policy Boss At X, Nick Pickles, Joins Sam Altman Venture

Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…

2 days ago

Bitcoin Rises Above $96,000 Amid Trump Optimism

Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…

2 days ago