Login Details And Other Personal Information Stolen By KeyRaider From Jailbroken Apple Devices
After Android, it’s now iOS that hackers have targeted. KeyRaider is believed to be one of the most dangerous threats affecting iOS devices by stealing login details and personal information of thousands of Apple users.
Spammers and hackers are always looking out for softwares and devices to hack and use for malicious reasons. Brands with devices running on Android are already busy fixing Stagefright, a bug that enters Android devices without requiring users to even click on the virus. Now, it’s Apple’s turn.
KeyRaider is a malware that is said to have stolen login information of Apple users who are using jailbroken devices.
What are jailbroken devices?
Jailbroken Apple devices are the ones that are not protected by Apple as their hardware restrictions have been removed. The malware has built itself into such unprotected devices. The experts are afraid that till date these tweaks have been downloaded over 20,000 times, which means approximately 2,25,000 account details have been stolen. Whoa! This is quite a big number.
Alerting the users, Apple’s support website said, “Jailbreaking your device eliminates security layers designed to protect your personal information and your iOS device. With this security removed from your iOS device, hackers may steal your personal information, damage your device, attack your network, or introduce malware, spyware or viruses.”
Read Also: Mac OS X Bug Soon To Be fixed by Apple
Palo Alto Networks, a cyber security company, said that on August 26, the account information that has been stolen by the malware is handed over to Apple, but the researchers could recover only half of the stolen information.
China is the most affected country. Other countries include U.S., South Korea, European countries and Australia. To fix the malware, Apple will soon release some guidelines.
KeyRaider is said to be the most dangerous threat to devices the tech industry has ever seen as it doesn’t just steal your personal information, it also acquires certificates and private keys used by Apple Push Notification Service. This results into users not being able to unlock their infected devices, neither by iCloud service nor by the passcode.