本文摘要:Researchers at a Silicon Valley security company said on Wednesday that they had found a new manner in which hackers can infect Apple products.周三,硅谷(Silicon Valley)一家安全性公司的研究人员回应,他们找到了一种黑客攻击苹果(Apple)产品的新方式。
Researchers at a Silicon Valley security company said on Wednesday that they had found a new manner in which hackers can infect Apple products.周三,硅谷(Silicon Valley)一家安全性公司的研究人员回应,他们找到了一种黑客攻击苹果(Apple)产品的新方式。The company, Palo Alto Networks, reported that it had uncovered a malware campaign called WireLurker targeting Apple mobile and desktop users and said it was “the biggest in scale we have ever seen.”帕洛阿尔托网络公司(Palo Alto Network)报告称之为,该公司找到了一种取名为WireLurker的针对苹果移动设备及台式电脑的恶意软件,相提并论“这是我们见过的规模仅次于的恶意软件”。Though the malware — malicious software designed to cause damage or steal information — is aimed at users in China and can be avoided, the campaign demonstrates new ways that attackers are targeting Apple iOS mobile devices.虽然这款恶意软件——目的导致伤害或窃取信息的软件——针对的是中国的用户,而且需要防止,但此次行动展出了攻击者肆虐装有苹果iOS系统的移动设备的新方式。The security company, based in Santa Clara, Calif., said that WireLurker had infected more than 400 applications designed for Apple’s Mac OS X operating system through the Maiyadi App Store, a third-party Mac application store in China. In the last six months, Palo Alto Networks said 467 infected applications were downloaded over 356,104 times and “may have impacted hundreds of thousands of users.”这家坐落于加利福尼亚州圣克拉拉的安全性公司回应,WireLurker早已通过麦芽地应用于商店——中国的第三方Mac应用于商店——病毒感染了400多个限于于苹果Mac OS X操作系统的应用于。
该公司称之为,在过去六个月中,467个被病毒感染的应用于已被iTunes了356104次,“有可能早已影响了数十万用户。”The company said users’ iOS devices could also become infected if they connected their mobile device to their Macs through a USB wire. “WireLurker monitors any iOS device connected via USB with an infected OS X computer and installs downloaded third-party applications or automatically generated malicious applications onto the device, regardless of whether it is jailbroken,” Palo Alto Networks security researchers said. “This is the reason we call it ‘wire lurker.’”该公司称之为,用户如果通过USB连接线将移动设备与Mac电脑相连,用户的iOS设备也不会受到感染。“任何iOS设备只要通过USB相连到不受病毒感染的OS X电脑,并加装iTunes的第三方应用程序,或自动在设备上产生蓄意应用程序,都会被WireLurker监控,不管设备否早已逃脱,”该公司安全性研究人员说道。
“因此我们称作‘wire lurker’(连接线中的潜藏者)。”Typically, iOS users can download applications from third parties only if they have “jailbroken” their phones, or altered them to run software Apple has not authorized. With WireLurker, an infected application can reach a non-jailbroken phone from an infected Mac OS X system, which is why Palo Alto Network researchers say WireLurker represents a “new brand of threat to all iOS devices.”iOS用户一般来说只有将手机“逃脱”——转变手机以运营予以苹果许可的软件,才能从第三方iTunes应用于。
被Wirelurker病毒感染的应用于需要通过不受病毒感染的Mac OS X系统肆虐仍未密码的手机,因此帕洛阿尔托网络公司的研究人员称之为,Wirelurker代表一种“针对所有iOS设备的新威胁”。Researchers say that once WireLurker is installed on a Mac, the malware listens for a USB connection to an iOS device and immediately infects it. Once infected, WireLurker’s creators can steal a victim’s address book, read iMessage text messages and regularly request updates from attackers’ command-and-control server. Though the creator’s ultimate goal is not yet clear, researchers say the malware is actively being updated.研究人员称之为,一旦WireLurker被加装到Mac电脑上,这款恶意软件就不会等候用户通过USB相连iOS设备,然后立刻病毒感染该设备。
一旦被病毒感染,WireLurker的制造者就能盗取受害人的通讯簿、加载iMessage中的短信并定期从攻击者的指挥官掌控服务器收到改版催促。尽管尚能不确切制造者的最后目的,但研究人员称之为,有人正在大力改版该恶意软件。“They are still preparing for an eventual attack,” said Ryan Olson, the director of threat intelligence at Palo Alto Networks. “Even though this is the first time this is happening, it demonstrates to a lot of attackers that this is a method that can be used to crack through the hard shell that Apple has built around its iOS devices.”“他们还在为最后的反击做到打算,”该公司威胁情报事务负责人瑞安·奥尔森(Ryan Olson)说道。
“尽管这种事情是第一次再次发生,但它向大量攻击者指出,这种方式可以用来击退苹果环绕其iOS设备建构起的柔软外壳。”Mr. Olson said Palo Alto Networks had alerted Apple to its findings, though an Apple spokesman declined to comment on their reports.奥尔森称之为帕洛阿尔托网络公司早已警告苹果留意涉及找到,但苹果的一名发言人拒绝接受就该公司的报告公开发表评论。
The firm’s advice to Mac and iOS users is to avoid downloading Mac applications or games from any third-party app store, download site or untrusted source, or connecting an iOS device to any untrusted accessories or computers. They also advise users to keep iOS software up to date.该公司给Mac电脑和iOS用户的建议是,防止iTunes任何来自第三方应用于商店、iTunes网站或受信任的来源的Mac应用于或游戏,并防止将iOS设备与任何不不受信任的配件或电脑相连。他们还建议用户持续改版iOS软件。
Separately, last Friday a researcher in Sweden announced that he had uncovered a serious new vulnerability in Yosemite, Apple’s latest OS X operating system. The researcher, Emil Kvarnhammar, said the vulnerability, which he calls “Rootpipe,” allows attackers to gain “root access,”or full administrative control, of a victim’s Mac, allowing them to steal information or run programs of their own.此外,瑞士一名研究人员上周五宣告,在苹果近期的OS X操作系统Yosemite中新发现了一个相当严重的漏洞。这位名为埃米尔·夸恩哈马尔(Emil Kvarnhammar)的研究人员回应,被他称为“Rootpipe”的这个漏洞能让攻击者提供受害者Mac的“根权限”,即几乎的管理控制权,以盗取信息或运营攻击者自己的程序。To date, there is no evidence that the vulnerability has actually been exploited and here, too, it would be difficult for the average Mac user to stumble upon. For hackers to gain control of a Mac, the victim would need to ignore every OS X pop-up security warning.迄今为止,尚能没证据指出早已有人利用了这个漏洞,并且普通Mac用户也很难遇上。
因为黑客要想要掌控Mac,受害者必需要忽视OS X插入的所有安全性警告。Apple is currently patching the Rootpipe vulnerability, but it is not clear when the patch will be completed.苹果正在修复Rootpipe漏洞,但尚能不确切修复工作何时已完成。
本文来源:内蒙11选5-www.sanstu.com
我要加盟(留言后专人第一时间快速对接)
已有 1826 企业通过我们找到了合作项目