New iOS flaw allows malicious apps to record touch screen presses
The captured touch screen data could be used to reconstruct what users typed
IDG News Service - Security researchers identified a vulnerability in iOS that allows apps to record all touch screen and button presses while running in the background on non-jailbroken devices.
Since the touch screen is the primary input interface on an iOS device, this attack is the equivalent of keylogging. An attacker could use the captured touch data -- X and Y axes coordinates -- to determine what characters victims inputted using the on-screen keyboard.
The vulnerability has been confirmed in iOS versions 7.0.6, 7.0.5, 7.0.4 and 6.1.x by researchers from security firm FireEye who identified the issue and reported it to Apple. The researchers also claim they found ways to bypass Apple's app review process which could allow uploading an app with such touch screen monitoring capabilities in the App Store.
"We have created a proof-of-concept 'monitoring' app on non-jailbroken iOS 7.0.x devices," the FireEye researchers said Monday in a blog post. "This 'monitoring' app can record all the user touch/press events in the background, including, touches on the screen, home button press, volume button press and TouchID press, and then this app can send all user events to any remote server."
Attackers could use social engineering techniques to trick victims into installing a malicious app or they could exploit some vulnerability in an existing app to use it for this type of background monitoring, the researchers said.
IOS 7 allows users to control which apps are allowed to refresh their content while running in the background, but there are ways to bypass that restriction, according to the FireEye researchers.
"For example, an app can play music in the background without turning on its 'background app refresh' switch," the researchers said. "Thus a malicious app can disguise itself as a music app to conduct background monitoring."
The best way to avoid this security issue in the absence of a patch from Apple is to use the iOS task manager to close apps operating in the background, the researchers said.
This is not the first research about recording touch screen events. Neal Hindocha, a senior security consultant at Trustwave, plans to demo "touchlogging" apps for Android and iOS at the RSA security conference Wednesday. However, his iOS proof-of-concept app requires the targeted device to be jailbroken, unlike FireEye's attack.
The FireEye researchers said they've conducted their research independently of Hindocha's and without being aware of his plans.
Apple did not immediately respond to a request for comment.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Security for Virtualization In the rush to implement virtualization, security has become second. So while the business benefits are clear, the risks are less well documented...
- HP HAVEn: See the big picture in Big Data HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Malware and Vulnerabilities White Papers | Webcasts