{"id":13315,"date":"2018-09-10T04:30:19","date_gmt":"2018-09-10T12:30:19","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/09\/10\/news-7082\/"},"modified":"2018-09-10T04:30:19","modified_gmt":"2018-09-10T12:30:19","slug":"news-7082","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/09\/10\/news-7082\/","title":{"rendered":"Mac and iOS apps stealing user data, an enterprise take"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2015\/09\/hack-hacker-cyber-thief-theft-stolen-100613858-primary.idge.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Mon, 10 Sep 2018 04:53:00 -0700<\/strong><\/p>\n<p>Reports claiming <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mac-app-store-apps-are-stealing-user-data\/\" rel=\"nofollow\">numerous apps<\/a> distributed through Apple\u2019s App Store are secretly exfiltrating user data should be an alarm call to enterprise CIOs. It signals a new battlefront in the eternal enterprise security wars.<\/p>\n<p>On the surface, the data being extracted is kind of\u2026 personal: Location, browser histories, information like this provides additional insight into what individual users are up to. Why should that concern an enterprise?<\/p>\n<p>That\u2019s a rhetorical question, of course. Most enterprise security professionals recognize that any form of data exfiltration poses an overall challenge.<\/p>\n<p>The security environment is becoming increasingly complex, criminals are getting better at combining data from multiple sources to identify targets, identify individuals and turn this knowledge into cold hard cash.<\/p>\n<p>We also know that as Apple makes its platforms <a href=\"https:\/\/blogs.computerworld.com\/article\/3290415\/apple-mac\/the-macbook-pro-s-t2-chip-boosts-enterprise-security.html\" rel=\"nofollow\">more secure<\/a>, criminals who still choose to target the platform are becoming much more sophisticated.<\/p>\n<p>They <a href=\"https:\/\/blogs.computerworld.com\/article\/3293922\/security\/apple-users-most-appealing-to-cybercriminals-online-scams.html\" rel=\"nofollow\">will even pay $15 for Apple ID data<\/a> and there is a huge market in preconstructed phishing and hacking tools online. A Malwarebytes survey earlier this year claimed\u00a0<a href=\"https:\/\/blogs.computerworld.com\/article\/3262225\/apple-mac\/warning-as-mac-malware-exploits-climb-270.html\" rel=\"nofollow\">malware attacks on Macs climbed 270 percent<\/a>\u00a0in 2017.<\/p>\n<p>Wickie Fung of Palo Alto Networks has warned: \u201cEnterprises must insist on complete pervasive security visibility in their environment including users, applications, data and threats.&#8221;<\/p>\n<p>Staff must be educated about the risk of installing unapproved apps.<\/p>\n<p>Enterprises must put procedures and protocols in place to protect against installation of data exfiltrating apps &#8212; in doing so they must also recognise that third party apps that do things more efficiently than those they themselves provide will be used, and should subject these to swift security analysis.\u00a0<\/p>\n<p>It is also important to check if existing threat intelligence systems are capable of identifying instances in which rogue apps are covertly stealing data.<\/p>\n<p>The <a href=\"http:\/\/www.applemust.com\/how-to-stop-mac-and-ios-apps-stealing-your-data\/\" rel=\"nofollow\">recently-identified apps<\/a> tend to parcel up the data they take to upload to remote servers \u2013 threat intelligence systems must recognize such transactions.<\/p>\n<p>Phishing attacks are much more effective if they are precisely targeted according to user habits \u2013 and users are still the weakest link in the security chain.<\/p>\n<p>Criminals understand (as did <a href=\"https:\/\/blogs.computerworld.com\/article\/3268406\/apple-mac\/mac-ios-how-to-check-if-cambridge-analytica-used-your-facebook-data.html\" rel=\"nofollow\">Cambridge Analytica<\/a>) that the value of data extracted from multiple data stacks far outweighs that held inside any single stack. Analytics systems enable such data to be identified and weaponized.<\/p>\n<p>There\u2019s money in these practises, and the potential to find information that helps infiltrate otherwise robust computing systems, as a recent College of Behavioral &amp; Social Sciences <a href=\"https:\/\/bsos.umd.edu\/featured-content\/researchers-exposing-human\" rel=\"nofollow\">cybercrime study found<\/a>.<\/p>\n<p>Information concerning a target\u2019s browsing habits can become a malware-infested message designed and personalized to that user to deliver a higher chance of success in infecting the end user\u2019s machine to place an exploit that becomes critical to undermining enterprise security.<\/p>\n<p>While it seems way too convenient that these revelations concerning a security flaw in the App Store model emerge just as Apple prepares to <a href=\"https:\/\/blogs.computerworld.com\/article\/3297077\/the-summer-2018-iphone-refresh-speculation-round-up.html\" rel=\"nofollow\">announce new mobile devices<\/a>, it seems unwise to dismiss them.<\/p>\n<p>It is also apparent that while the news tarnishes Apple\u2019s security model, it\u2019s inevitable other platforms will also be experiencing covert data grabbing through otherwise innocuous apps.<\/p>\n<p>Any responsible platform developer should already be taking robust steps to protect against this, including insistence that apps maintain strict (and transparent) data protection policy, as <a href=\"https:\/\/blogs.computerworld.com\/article\/3302380\/apple-insists-developers-ramp-up-their-privacy-commitments.html\" rel=\"nofollow\">Apple now demands<\/a>.<\/p>\n<p>This stuff matters. All the apps <a href=\"http:\/\/www.applemust.com\/how-to-stop-mac-and-ios-apps-stealing-your-data\/\" rel=\"nofollow\">recently identified<\/a> as rogue by <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mac-app-store-apps-are-stealing-user-data\/\" rel=\"nofollow\">Malwarebytes<\/a>, <a href=\"https:\/\/guardianapp.com\/ios-app-location-report-sep2018.html\" rel=\"nofollow\">Sudo Security<\/a> and security researcher, <a href=\"https:\/\/objective-see.com\/blog\/blog_0x37.html\" rel=\"nofollow\">Patrick Wardle<\/a>, would (I think) have been breaking the new data privacy rules Apple now insists developers follow.<\/p>\n<p>Not only this, but developers of those apps would have been required to take much more responsibility for any data they chose to exfiltrate, under Apple\u2019s <a href=\"https:\/\/blogs.computerworld.com\/article\/3302380\/apple-insists-developers-ramp-up-their-privacy-commitments.html\" rel=\"nofollow\">new rules<\/a>.<\/p>\n<p>Taking such information without securing a user\u2019s express consent is absolutely forbidden.<\/p>\n<p>Apple CEO, Tim Cook has <a href=\"http:\/\/www.applemust.com\/16-important-things-apple-ceo-tim-cook-told-us-we-need-to-know\/\" rel=\"nofollow\">often stressed<\/a> the position that \u201cPrivacy to us is a human right, a civil liberty.\u201d<\/p>\n<p>These days we should all recognise that the price of protecting such rights is eternal vigilance.\u00a0<\/p>\n<p>The apps engaged in these practises should be seen as honey traps:<\/p>\n<p>Adware Doctor, for example, promises something users want &#8212; to eradicate unwanted advertising online, but fails to inform them that it will grab browser histories to covertly send to unknown servers based in China.<\/p>\n<p>The fact that the app was one of the top apps distributed at the App Store adds another layer of risk. We\u2019ve all learned that apps distributed through the store tend to be trustworthy. Apple must now apply much more strict security checks for any apps listed in the top 100 apps in any country at any store in future.<\/p>\n<p>However, enterprise security chiefs must also educate users of this new emerging App Store risk and advise against installation of any relatively obscure app on <em>any enterprise device<\/em> on <em>any platform<\/em>, unless chosen from an approved list.<\/p>\n<p>I mentioned gray IT: users will use third party solutions if they are better or easier to use than enterprise-provided apps. This means that enterprise security team must assess and verify the security of popular third-party apps used on their networks, as those apps will be used no matter how many memos are published. Best practise advice will be a far more effective response than top-down admonition against using such apps.<\/p>\n<p><strong>Google+?<\/strong>\u00a0If you use social media and happen to be a Google+ user, why not\u00a0join\u00a0<a href=\"https:\/\/plus.google.com\/u\/0\/communities\/102592251674546201152\" rel=\"nofollow\">AppleHolic&#8217;s Kool Aid Corner community<\/a>\u00a0and get involved with the conversation as we pursue the spirit of the New Model Apple?<\/p>\n<p><strong>Got a story? Please\u00a0<\/strong><a href=\"https:\/\/twitter.com\/jonnyevans_cw\" rel=\"nofollow\">drop me a line via Twitter<\/a>\u00a0and let me know. I&#8217;d like it if you chose to follow me on Twitter so I can let you know about new articles I publish and reports I find.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3304421\/mobile-wireless\/mac-and-ios-apps-stealing-user-data-an-enterprise-take.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2015\/09\/hack-hacker-cyber-thief-theft-stolen-100613858-primary.idge.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Mon, 10 Sep 2018 04:53:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Reports claiming <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mac-app-store-apps-are-stealing-user-data\/\" rel=\"nofollow\">numerous apps<\/a> distributed through Apple\u2019s App Store are secretly exfiltrating user data should be an alarm call to enterprise CIOs. It signals a new battlefront in the eternal enterprise security wars.<\/p>\n<h2><strong>The\u00a0enterprise risk of personal data<\/strong><\/h2>\n<p>On the surface, the data being extracted is kind of\u2026 personal: Location, browser histories, information like this provides additional insight into what individual users are up to. Why should that concern an enterprise?<\/p>\n<p>That\u2019s a rhetorical question, of course. Most enterprise security professionals recognize that any form of data exfiltration poses an overall challenge.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3304421\/mobile-wireless\/mac-and-ios-apps-stealing-user-data-an-enterprise-take.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11078,10554,714],"class_list":["post-13315","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple-mac","tag-mobile","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13315","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13315"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13315\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13315"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}