Story image

iOS gets another round of critical security updates to block major security holes

27 Jul 2017

Apple’s iOS 10.3.3 has undergone an urgent update after massive security holes were discovered in many of the system’s functions.

The security updates affect iPhone 5 and later, iPad 4th generation and later, as well as the iPod Touch 6th generation.

The flaws can allow remote attackers to run arbitrary code or terminate apps through a number of iOS systems, including its contacts, messages, notifications, Safari, telephony, wifi and other system functions including kernels, libxpc, EventKitUI and CoreAudio.

Attackers could also potentially execute code by taking advantage of a device’s wifi chip, while users who stumbled upon malicious web content could find that their browser was frozen due to an infinite number of print dialogues.

In total, there are 24 areas and 47 CVE updates listed for iOS 10.3.3, most of which were discovered by Google’s Project Zero, Baidu Security Lab, university professors and security researchers.

Apple says that it doesn’t discuss or confirm security issues until it has investigated and made relevant patches and updates available.

While some iOS users still believe that devices are still relatively immune from hacking, proof from security organisations shows otherwise.

Earlier this year ESET’s Graham Clueley said in a blog that updates such as these are not about pointing out every single flaw in the system – it’s more of an encouragement for people to update systems at the earliest opportunity.

“Apple products may find themselves in the firing line of attacks less often than their Windows and Android cousins, but that doesn’t mean they’re immune. If can learn anything from the events of the last few days it is surely the need to keep systems up-to-date and make regular backups of your data,” he says.

iOS and other Apple devices have also been targeted by spyware such as Pegasus and XAgent and AceDeceiver – a malware that targeted Apple’s DRM flaws.

Other cases this year included OSX/Dok, which popped up in April 2017. Check Point researchers discovered the Trojan, which was able to get around Apple’s security features and hijack all traffic on a Mac.

A ransomware variant called KeRanger was also able to encrypt Apple devices in March 2016. The ransomware was introduced via an update of Transmission torrent client 2.9.0. It was then able to run alongside the software and secretly encrypt files.

Palo Alto Network's Claud Xiao and Jin Chen explain how KeRanger works:

"The KeRanger application was signed with a valid Mac app development certificate; therefore, it was able to bypass Apple's Gatekeeper protection,” said Palo Alto Networks researchers Claud Xiao and Jin Chen at the time.

Apple quickly revoked the certificate to stop further ransomware attacks.

Microsoft urges organisations to tackle data blindspots
Despite significant focus placed on CX transformation, over a third of Australian organisations claimed that more than one in five of their projects failed.
Raising the stakes: McAfee’s predictions for cybersecurity
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Renesas develops 28nm MCU with virtualisation-assisted functions
The MCU features four 600 megahertz CPUs with a lock-step mechanism and a large 16 MB flash memory capacity.
DOCOMO ranked world's top mobile operator in 5G SEP applications
NTT DOCOMO has been ranked the world's leading mobile operator in terms of applications for candidate standard-essential patents.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”
CylancePROTECT now available on AWS Marketplace
Customers now have access to CylancePROTECT for AI-driven protection across all Windows, Mac, and Linux (including Amazon Linux) instances.
Gartner’s top 10 data and analytics trends for 2019
Data is the fuel for the modern world, and analytics the engine. Gartner has compiled the top 10 trends to watch this year.
How CIOs can work with colleagues to drive new competitive advantages
"If recent history has taught us anything, it’s that the role of the CIO is always changing, and that it won’t stop changing anytime soon."