Story image

New Backstab cyberattack targeting iOS devices

14 Dec 2015

Details of a new attack method have been revealed by security company Palo Alto Network, which sees the theft of private information from mobile device backup files that are stored on a victim’s computer. 

The BackStab attacks see cyber criminals use malware to remotely infiltrate computers, Palo Alto explains. According to company, iOS devices are particularly vulnerable. 

Used to capture text messages, photos, geographic location data, and almost any other type of information stored on a mobile device in their possession, BackStab has been employed by law enforcement and cyberattackers alike, Palo Alto says.

According to the company’s Unit 42 whitepaper, BackStab attacks have evolved to leverage malware for remote access. It says Apple iOS devices have been a primary target for attacks, as the default settings in iTunes store unencrypted backup files in fixed locations and automatically sync devices when they are connected to a user’s computer. 

“Cybersecurity teams must realise, just because an attack technique is well-known, that doesn’t mean it’s no longer a threat,” explains Ryan Olson, director of threat intelligence, Unit 42, Palo Alto Networks.

“While conducting our research into BackStab attacks, we gathered over 600 malware samples from 30 countries around the world that were used to conduct remote BackStab attacks,” he says. 

Palo Alto Networks suggest iOS users encrypt their local backups or use the iCloud backup system and choose a secure password. The company says users should upgrade iOS devices to the latest version, which creates encrypted backups by default. 

Additionally, when connecting an iOS device to an untrusted computer or charger via a USB cable, users should not click the Trust button when the dialogue box is displayed.

Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.
Raising the stakes: McAfee’s predictions for cybersecurity
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”