
In July of this year, the young security company found what they are calling a "Masque Attack" on iOS devices that replaces user-installed applications on jailbroken and non-jailbroken iPhones and iPads running iOS 7.1.1 and later (including the 8.1.1 beta). The malware has the capability of overwriting a safe application that the user installed on the app store with a malicious version of it. The new malicious app has the cap
The Basic Process:
- User downloads a safe application from the Apple App Store
- User is lured into downloading a new 3rd party application
- New application installs, but also modifies "safe" application from Step 1
- Safe app's data is now completely accessible by malware perpetrators
In order to avoid the Masque Attack, avoid downloading applications that don't come directly from the Apple app store.