Malware-infected iPhone, iPad apps found in Canadian App Store - Action News
Home WebMail Saturday, November 23, 2024, 12:15 PM | Calgary | -12.1°C | Regions Advertise Login | Our platform is in maintenance mode. Some URLs may not be available. |
Science

Malware-infected iPhone, iPad apps found in Canadian App Store

Canadians may have unwittingly infected their iPhones and iPads with malware downloaded from the App Store. Here's what apps were affected and what to do to protect yourself.

Users advised to uninstall WeChat, CamCard, WinZip and change iCloud password

Many of the affected apps were only available on the App Store in China, yet some that were reportedly infected by the malware including WeChat, business card rolodex CamCard and file extractor WinZip are available in Canada. (George Frey/Getty Images)

Apple announced a rare security breach over the weekend that means some Canadians may have unwittingly infected their iPhones and iPads with malware that could expose their iCloud passwords and other personal data.

Apple Inc. has removed some applications from its app store after developers in China were tricked into using software tools that added malicious code to their work.

Apple hasn't provided details about which companies' apps were affected.

But Tencent Ltd. said its popular WeChat app was hit; the company released a new version after spotting the offending code. Chinese news reports said others affected included banks, an airline and a popular music service.

Many of the affected apps were only available on the App Store in China, yet some that were reportedly infected by the malware including WeChat, business card rolodex CamCard and file extractor WinZip are available in Canada.

Uninstall or update

Users are advised to uninstall the affected apps or update to the latest version released after the malware was discovered, and to change their iCloud passwords.

The malicious code spread through a counterfeit version of Apple's Xcode tools used to create apps for its iPhones and iPads, according to the company. It said the counterfeit tools spread when developers obtained them from "untrusted sources" rather than directly from the company.

The malicious software collects information from infected devices and uploads it to outside servers, according to Palo Alto Networks, a U.S.-based security firm. The company said the breach could result in fake password prompts aimed at harvesting iCloud details or other logins.

It was first publicized last week by security researchers at Alibaba Group, the Asian e-commerce giant, who dubbed it XcodeGhost.

The creators of the malware took advantage of public frustration with Beijing's internet filters, which hamper access to Apple and other foreign websites. That prompts some people to use copies of foreign software or documents that are posted on websites within China to speed up access.

"Sometimes network speeds are very slow when downloading large files from Apple's servers," wrote Claud Xiao, a Palo Alto Networks researcher, on its website. Due to the large size of the Xcode file, "some Chinese developers choose to download the package from other sources or get copies from colleagues."

Companies with apps that were affected include taxi-hailing service Didi Kuaidi, Citic Industrial Bank, China Southern Airlines and the music service of NetEase, a popular Web portal, according to the newspaper Yangcheng Evening News.

The incident isonly the sixth time malicious software is known to have made it through Apple's screening process for products on its App Store, according to Xiao.