![]() ![]() ![]() “When we started seeing communication between iOS devices and the known malware domain, we investigated further.” “The domain was on a watchlist we established due to its use in distributing a specific strain of Android malware in the past,” said Michael Covington, Wandera’s vice-president of product. Wandera, an enterprise security firm, said it found 14 apps - all retro-style games - that were communicating with the same command and control server used by the Golduck malware. Now, the researchers say iPhone apps linked to the malware could also present a risk. At the time, more than 10 million users were affected by the malware, allowing hackers to run malicious commands at the highest privileges, like sending premium SMS messages from a victim’s phone to make money. The malware has been known about for over a year, after it was first discovered by Appthority infecting classic and retro games on Google Play, by embedding backdoor code that allowed malicious payloads to be silently pushed to the device. Security researchers say they’ve found more than a dozen iPhone apps covertly communicating with a server associated with Golduck, a historically Android-focused malware that infects popular classic game apps. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |