All the latest UK technology news, reviews and analysis

Stolen iOS data used as malware lure

15 Sep 2012
malware virus security threat breach

The recent high-profile breach of Apple iOS device data has become the latest lure for malware writers looking to infect users.

Researchers with McAfee have discovered a series of files being advertised on download services as an archive of the data stolen by hackers affiliated with the Anonymous AntiSec campaign.

Though the hackers claimed that the data was lifted from the personal laptop of an FBI agent, the bureau denied the claim and a US publisher later took blame for the breach.

According to McAfee senior threat researcher Francois Paget, the attackers have hidden a Trojan as file made to look as if it contained the hacked data.

"As you might have guessed, this file is not the real list but an 'exe' file and, of course, a malware!" Paget said in a company blog post.

"Once again, we recommend you take care before downloading an alleged sensational file."

The malware spotting comes in the wake of an admission from Blue Toad that its servers were the source of the lost Apple UDID numbers. The company said that its servers had been attacked and that a collection of UDID codes had been lifted.

The use of prominent news items and current events has long been a popular method for infecting users with malware. Attackers often disguise attack sites and Trojan applications as news sites or movie files in order to trick users.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Shaun Nichols

Shaun Nichols is the US correspondent for He has been with the company since 2006, originally joining as a news intern at the site's San Francisco offices.

More on Security
What do you think?
blog comments powered by Disqus

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?

Popular Threads

Powered by Disqus
Sony Xperia Z2 Tablet powered by Android KitKat 4.4

Sony Xperia Z2 Tablet video

We take a look at the lightweight, waterproof tablet

Updating your subscription status Loading

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery


iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

Lead .Net Developer – Document / Data Transformation

Lead .Net Developer – Document / Data Transformation...

SharePoint Developer

SharePoint Developer – Data Development £60,000...

BizTalk Developer

BizTalk Developer £65,000 + benefits / Luton...

Project Manager – Risk, Planning, Control and Stakeholder management

Project Manager – Risk, Planning, Control and Stakeholder...
To send to more than one email address, simply separate each address with a comma.