New in OS X: Get MacRumors Push Notifications on your Mac

Resubscribe Now Close

Chinese Authorities Shut Down WireLurker Distribution Site, Arrest Suspects Involved

lightning_usb_cable_0_5_mLast Friday, Chinese authorities arrested three individuals that are suspected of developing the "WireLurker" malware, which infected thousands of mobile devices in China after Mac users installed malicious software from a third-party App Store.

According to a police post on Chinese social network Sina Weibo, the three men were arrested in Beijing on suspicion of "manufacturing and distributing" WireLurker after police received a tip from Chinese security company Qihoo 360 technology. In addition to arresting the suspects involved in the creation of the malicious software, Chinese authorities also shut down the site that was spreading it.

First publicized by researchers in early November, WireLurker is a trojan that infected thousands of Chinese iOS and Mac users after they installed software from the Maiyadi App Store, a third-party app platform that delivered more than 400 infected OS X applications.

WireLurker was able to attack iOS devices through Macs using USB, and was described as heralding "a new era in malware attacking Apple's desktop and mobile platforms." After being installed on a Mac, WireLurker would infect an iOS device using enterprise provisioning, making it the first malware capable of installing third-party applications on non-jailbroken iOS devices.

At the time information was published on WireLurker, infected apps had already been downloaded more than 356,104 times. Apple quickly took steps to block the infected apps, preventing them from launching, and in a statement, it reminded users not to install software from untrusted sources.

Just a week after WireLurker surfaced, another vulnerability in iOS was publicized by researchers. Called Masque Attack, it also infects iOS devices using enterprise provision profiles and is somewhat more dangerous, as it can replace existing apps with nearly undetectable fake versions.

Though it hasn't been found in the wild, Masque Attack prompted a warning from the U.S. government and a statement from Apple, with the company once again encouraging customers to download apps only from trusted sources.

Neither Masque Attack nor WireLurker are likely to affect the average iOS user as long as Apple's security features are not bypassed, as both vulnerabilities circumvent the App Store and Mac App Store to install apps.


Top Rated Comments

(View all)

20 months ago
Probably gave them an offer they couldn't refuse: go on the government payroll or go to jail.
Rating: 13 Votes
20 months ago
I will need to see more evidence before i'm convinced that this so called arrest isn't just propaganda.
Rating: 11 Votes
20 months ago
"Neither Masque Attack nor WireLurker are likely to affect the average iOS user as long as Apple's security features are not bypassed, as both apps circumvent the App Store and Mac App Store to install apps."

And that's the key portion of the article, my friends. Live 'dangerously' at your own peril.
Rating: 8 Votes
20 months ago
My favorite part of these attacks are the part when I realize that because I download stuff only from the App Store and my company's website, I'm good. Love that security.
Rating: 8 Votes
20 months ago
PLA unit 61398 didn't like the competition.
Rating: 7 Votes
20 months ago
There will be lurkers waiting for them in the prison. Good job!
Rating: 6 Votes
20 months ago

Good for you China! (and your highly-regulated or whatever internet?)


A part of me still suspects that China was behind these attacks.
Rating: 5 Votes
20 months ago
Arrested? Nope. They are "recruited" to the Chinese hacker/spy team.
Rating: 4 Votes
20 months ago
Probably just a PR stunt considering Wirelurker is PLA government sponsored.
Rating: 4 Votes
20 months ago
Yep.....

Pretty swift action there - Apple obviously wanted it addressed and fast.
Rating: 3 Votes

[ Read All Comments ]