Monday Dec 23, 2024
Monday, 11 September 2017 00:00 - - {{hitsCtrl.values.hits}}
Skycure, the leader in mobile threat defense, has released the company’s latest mobile threat intelligence report ‘10 Years of (Hacking) iOS’.
The report examines the security impact of iOS on the enterprise over the past 10 years and includes Skycure analysis of iOS mobile threat data from the first quarter of 2017. The study found that as iOS has become more popular as a platform, especially for enterprise executives and government agency officials, the rate of attack and incidents of malware have increased. According to the report, the percentage of enterprise iOS devices that have malicious apps installed today has more than tripled since Q3 2016.
In comparison, the rate of Android malware infections has stayed relatively flat. In addition, the number of disclosed vulnerabilities in the first quarter of 2017 was greater than all of 2016.
Co-founder and CTO of Skycure Yair Amit said: “iOS has had a profound effect on the security of enterprises. The iPhone ushered in the trend of BYOD, and the concept of apps and the app store, changing how IT manages corporate networks and equipment. The impact of iPhones and iPads on work productivity means more employees are choosing iOS devices for BYOD, and that makes iOS a valuable target for hackers. The number of vulnerabilities and malware does not indicate how secure a platform is but it does indicate how often hackers are attempting to break into it. Increasing malware and vulnerabilities demonstrate that hackers want to break into iOS devices. Enterprises need to make sure that they don’t find a way in.”
There’s a (Malicious) App for that
The Skycure study reports that malware on iOS devices is becoming more prevalent as the sophistication of exploits continues to increase. The rate of iOS malware has continued to increase and tripled from Q3 2016 to Q1 2017.
Apple does a tremendous job of keeping malware out of the App Store. A common misconception is that iOS devices can’t get malware because apps must come from the Apple App Store. In truth, there are many ways to infect an iOS device, according to the Skycure report. The Skycure report lists the following methods and examples of threats that exploited them to infiltrate devices:
Today’s attacks are becoming very good at hiding their presence to extend the period of control or spying access. XcodeGhost exploited the iOS development environment itself to get malware into the App Store. The report includes a ‘Mobile Kill Chain’ to demonstrate the step-by-step process used by the most dangerous mobile threats today, beginning with targeted social engineering to get the victim to click or install something, then jailbreaking the device, and ending with the bad guys having access to GPS, camera, microphone, SMS, email and other apps.
Publicly disclosed vulnerabilities are on the rise but iOS devices are patched quickly
One of the most important things that can be done to secure a mobile device is to be sure it is on the latest security patch. Despite the increase in malware, iOS devices have a much shorter window of vulnerability to any exploit because they are more likely to have the most updated security patches.
In the Skycure study, 91% of active devices were on the latest major version (iOS 10) at the end of Q1, and 22% were on the latest minor release (iOS 10.3). By comparison, only 21% of Android devices were on the most recent Android version (7.0 – Nougat). A previous Skycure report found that 71% of Android devices still run on security patches more than two months old.
iOS and risky network exposure
The Skycure report also examined the risk of network exposure on iOS devices, finding the following in Q1 of this year:
In any typical organisation, about 21% of all mobile devices will be exposed to a network threat in the first month of security monitoring. This number goes to 41% over the next three months.
Top five recommendations to keep iOS device safe
The Skycure researchers offered the following tips to keep iOS devices safe: