Masque Attack
Masque Attack is the name of an iOS vulnerability identified and named by computer security company FireEye, Inc. in July 2014. FireEye privately informed Apple Inc. of the issue on July 26, 2014 and disclosed the vulnerability to the public on November 10, 2014 through a blog post on their website. The vulnerability is identified to exist on iOS 7.1.1, 7.1.2, 8.0, 8.1 and 8.1.1 beta, and on jailbroken and non-jailbroken iOS devices. The vulnerability consists of getting users to download and install apps that have been deceptively created with the same bundle identifier as an existing legitimate app. The deceptive app can then replace and pose as the legitimate app, as long as the app was not one pre-installed along with iOS (i.e., the default Apple apps) - and thus, the reason FireEye gave for naming the vulnerability "Masque Attack."[1]
On November 13, 2014, the United States Computer Emergency Readiness Team (US-CERT, part of the Department of Homeland Security) released Alert bulletin TA14-317A, regarding the Masque Attack.[2]
Apple stated on November 14 that they were not aware of any incidents in which one of their customers had been affected by the attack.[3]
References
- ↑ Hui Xue, Tao Wei and Yulong Zhang (November 10, 2014). "Masque Attack: All Your iOS Apps Belong to Us". FireEye. Retrieved November 14, 2014.
- ↑ "Alert (TA14-317A): Apple iOS "Masque Attack" Technique". US-CERT. November 13, 2014. Retrieved November 16, 2014.
- ↑ Kedmey, Dan (14 November 2014). "Apple Isn't Aware of Any iOS 'Masque Attack' Incidents Yet". Time. Retrieved 14 November 2014.