Published On: Tue, Sep 19th, 2017

iOS Configuration Profiles Can Be Abused to Crash iPhones – Flood iOS Devices with Unremovable Icons

When compared to Android, iOS offers cybercriminals a significantly smaller success rate generally due to a platform’s “walled garden” approach. However, criminals are now targeting iOS some-more than ever before as a height sees a flourishing series of users, generally in business and supervision sector.

While not wholly an attack, a latest debate appears to have started as a antic and could describe an iOS device totally unresponsive. First speckled in late 2016, an iOS jailbreaker named iXintpwn started posting a antagonistic form that researchers dubbed as iXintpwn/YJSNPI. Also famous as Beast Senpai, a malware was distributed by a Japanese youngster. The iOS config form malware would means an crawl of icons all over a aim device and eventually spin it unresponsive.

iphone-x-ios-securityRelated “1 in 50 iOS Apps Is Leaking Data to Third Parties,” Security Report Reveals

Abusing iOS config profiles to inundate iPhone home shade with uninstallable icons

The confidence experts during Trend Micro have suggested that a conflict sequence of YJSNPI is important as enemy are weaponizing unsigned iOS pattern profiles. Configuration profiles capacitate developers to streamline a settings of devices, with enterprises contracting these profiles to conduct their apps and corporate devices.

A pattern form can also customize a settings of a device’s restrictions, Wi-Fi, Virtual Private Network (VPN), Lightweight Directory Access Protocol (LDAP) directory, Calendaring Extensions to WebDAV (CalDAV), web clips, credentials, and keys.

Malicious profile, however, can use this iOS underline to manipulate a settings, like ludicrous a device’s traffic. But iXintpwn/YJSNPI simply uses an unsigned form to set a value to “cannot be deleted,” creation users incompetent to uninstall images.

Hacker uses this sold smirch to superimpose icons on a home screen. When clicked, these icons usually uncover a bigger fortitude of a same image. Researchers remarkable that it is “during this crawl of icons that a device becomes unresponsive.”

iphone-hack-2Related There’s a $500 Box Available in a Market That Hacks into Any iPhone 7 and 7 Plus

“Clicking it formula in an crawl of YJSNPI icon-laden screens that crashes SpringBoard – a focus that manages a home shade and controls how apps are displayed and launched.”

The YJSNPI prankware (is that a term?) proliferates by a websites that horde a antagonistic profile, generally around Safari. “On iOS devices, a latest Safari accepts this server response and will automatically download a profile,” a researchers wrote.

As for a mitigation, a TM confidence group suggests regulating Apple Configurator 2 to find and mislay a antagonistic profiles. For some-more technical sum on this prankware, conduct over to Trend Micro.

About the Author

Leave a comment

XHTML: You can use these html tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>