sb-nz logo
Story image

Symantec finds fraudulent jailbreaking site that's tricked 100,000 iOS users

04 Oct 2016

Scammers are now going after unwitting users who want to jailbreak their iOS devices, and are spoofing popular jailbreaking site TaiG to do it.

Symantec discovered the scam through a spoof page that is labelled with TaiG branding, but has a different look and domain name (TaiG9) to the genuine site (TaiG).

Users who visit the fake site are told that the 'beta tool' can perform a jailbreak through an iOS device browser. Users taken through steps to jailbreak their iOS 9.2.1 devices, but given misleading web links to do so.

Symantec says that once the final step is complete, the page serves an iOS configuration profile that's signed as a trusted profile by COMODO CA.

The profile contains a web clip which puts a website shortcut on the home screen. The shortcut masquerades as an app.

The link leads to a third party app store which reportedly offers 'freemium' products if a donation is made.

While Symantec was reportedly 'unable to detect any activity related to jailbreaking in the browser aside from the dialog displayed by the site', it's still warning users to be careful when attempting to install the Cydia app from this store.

Symantec says the Cydia app is a fake and not the real thing. By following this entire process, users have been tricked into thinking their phone is jailbroken, subjected to fraudulent solicitations and directed to a fake app store.

The company warns iOS users to not become one of the 100,000 Symantec users who have been tricked. The fake page has been widely shared through Google search and Reddit. Symantec advises against jailbreaking devices.

Story image
Emotet remains leading malware in global threat index
The malware has impacted 7% of organisations globally, following a spam campaign which targeted more than 100,000 users per day during the holiday season.More
Story image
Check Point exposes Android malware vendor using dark net to rebrand products
Check Point security researchers have exposed an Android malware vendor using a marketer on the dark net to rebrand its products, with the intention of supercharging business and throwing off security vendors. More
Story image
Hackers in your bedroom: Hackers targeting smart sex toys
A group of researchers reported vulnerabilities in an internet-enabled male chastity cage. More
Story image
The current state of ransomware — and its future
Discoveries made by analysts at Sophos have unearthed a new development: ransomware code appears to have been shared across ‘families’, and some of the ransomware groups seemed to work in collaboration more than in competition with one another. More
Story image
IronNet expands Asia Pacific presence with new strategic partnership
“The combination of M.Tech’s extensive network in Asia Pacific and our unparalleled expertise in threat intelligence and detection will help more enterprises across the region to proactively identify and take down known and unknown threats before they happen.”More
Story image
Sophos Rapid Response puts out the ransomware fire
“Attackers are using a range of techniques and whichever defence has a weakness is how they get in. When one technique fails they move on to the next, until they find a weak spot."More