	{"id":34741,"date":"2014-12-15T09:17:37","date_gmt":"2014-12-15T17:17:37","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=34741"},"modified":"2016-02-12T10:48:33","modified_gmt":"2016-02-12T18:48:33","slug":"dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/","title":{"rendered":"Don&#8217;t Jailbreak Your iPhone if You Want to Avoid the Cloud Atlas Malware"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-34750\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/cloudatalas-600x300.jpeg\" alt=\"Cloud Atlas\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/cloudatalas-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/cloudatalas-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/cloudatalas-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><br \/>\nCloud Atlas is the latest purported example of sophisticated state-sponsored malware, said to have snooped on diplomats, oil industry workers and the financial industry, intercepting communications and recording phone calls.<\/p>\n<p>And iPhone and iPad users don&#8217;t escape entirely unscathed.<\/p>\n<p>According to detailed reports published by <a title=\"Link to Blue Coat blog\" href=\"https:\/\/www.bluecoat.com\/security-blog\/2014-12-09\/blue-coat-exposes-%E2%80%9C-inception-framework%E2%80%9D-very-sophisticated-layered-malware\" target=\"_blank\" rel=\"nofollow\">Blue Coat<\/a> and <a title=\"Link to Kaspersky blog\" href=\"https:\/\/securelist.com\/blog\/research\/68083\/cloud-atlas-redoctober-apt-is-back-in-style\/\" target=\"_blank\" rel=\"nofollow\">Kaspersky<\/a>, victims in Russia and other countries around the globe would be duped into opening documents and clicking on links\u2014believing they were going to read an advert for an old diplomatic car or click on a link to an upgraded version of WhatsApp.<\/p>\n<p>The devices which were probably most likely to have been affected by the malware attack, which exploited vulnerabilities in the Word Rich Text Format (RTF), were regular Windows computers, who might find themselves on the receiving end of decoy documents claiming to come from &#8220;Mrs World&#8221; (seemingly with words taken from a Russian news site), adverts for diesel engine parts or files called &#8220;Diplomatic Car for Sale.doc.&#8221;<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-34753\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/diplomatic-car-600.jpeg\" alt=\"Diplomatic car ad\" width=\"600\" height=\"682\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/diplomatic-car-600.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/diplomatic-car-600-131x150.jpeg 131w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/diplomatic-car-600-263x300.jpeg 263w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>But the good news is that if you haven&#8217;t jailbroken your iOS device, Cloud Atlas isn&#8217;t likely to give you much cause for concern.<\/p>\n<p>The simple truth can&#8217;t be ignored that there is much much more malware for Windows and Android than there is for Macs and iPhones.<\/p>\n<p>That doesn&#8217;t mean, of course, that you can afford to be glib when it comes to protecting your Apple devices\u2014but the majority of malware that is created is written for operating systems that weren&#8217;t developed in Cupertino.<\/p>\n<p>And the sophisticated Cloud Atlas malware (also called &#8220;Inception&#8221; by some security vendors, but detected by <a title=\"Mac Virus Protection &amp; Security Products for Home\" href=\"https:\/\/www.intego.com\/products\" target=\"_blank\">Intego products<\/a> as <strong>iOS\/CloudAtlas<\/strong>) infects Windows computers, BlackBerrys and Android devices, appears to be no different.<\/p>\n<p>It can only exploit Apple&#8217;s iOS iPhones and iPads if they have been jailbroken.<\/p>\n<p>And, I have to wonder, is jailbreaking as popular today with iPhones and iPads as it was in the past? The addition of new features into iOS 8 (such as <a title=\"Link to Share extensions\" href=\"http:\/\/www.imore.com\/sharing-ios-8-explained\" target=\"_blank\" rel=\"nofollow\">share extensions<\/a> and <a title=\"Link to custom keyboards\" href=\"http:\/\/appleinsider.com\/articles\/14\/11\/12\/roundup-the-best-third-party-keyboards-for-ios-8-\" target=\"_blank\" rel=\"nofollow\">custom keyboards<\/a>) has surely chipped away at the attraction of cracking open the operating system and allowing apps from beyond the walled garden of the App Store to be installed.<\/p>\n<p>None of this, of course, makes it any less attractive for a determine hacker (or a foreign government interested on spying on the secrets of others) from attempting to infect whatever brand of mobile phone their target might choose to carry. And that probably explains why security researchers found the iOS malware on the same server that was hosting the Android and BlackBerry trojans.<\/p>\n<p>Blue Coat researchers observed that links to the mobile versions of the Cloud Atlas spyware would be distributed by bogus mailshots, such as this one claiming to be a new version of WhatsApp sent to a Paraguayan government email address:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-34756\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/whatsapp.jpeg\" alt=\"Malicious email, pretending to be from WhatsApp\" width=\"600\" height=\"320\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/whatsapp.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/whatsapp-150x80.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/whatsapp-300x160.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Once installed on a jailbroken iOS device, the malware can collect a wide variety of information and transmit it to an FTP account under the attackers&#8217; control.<\/p>\n<p>None of this, though, will be successful if you left your iPhone or iPad in its factory state, and declined to jailbreak it to allow unvetted third-party apps to have free reign over your device.<\/p>\n<p>The message is simple: You may have lots of reasons why you want to jailbreak your iPhone, but you are putting yourself at <a title=\"Don\u2019t Jailbreak Your iPhone if You Want to Stop Government Spyware\" href=\"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-stop-government-spyware\/\" target=\"_blank\">greater risk of compromise via government spyware<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud Atlas is the latest purported example of sophisticated state-sponsored malware, said to have snooped on diplomats, oil industry workers and the financial industry, intercepting communications and recording phone calls.<\/p>\n<p>And iPhone and iPad users don&#8217;t escape entirely unscathed.<\/p>\n","protected":false},"author":34,"featured_media":34747,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,13,5],"tags":[21,3151,1777,1774,1771,69,1486,1768,9,74,1483,86,125,149],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Cloud Atlas is the latest purported example of sophisticated state-sponsored malware, said to have snooped on diplomats, oil industry workers and the financial industry, intercepting communications and recording phone calls.  And iPhone and iPad users don&#039;t escape entirely unscathed.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Don&#039;t Jailbreak Your iPhone if You Want to Avoid the Cloud Atlas Malware - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Cloud Atlas is the latest purported example of sophisticated state-sponsored malware, said to have snooped on diplomats, oil industry workers and the financial industry, intercepting communications and recording phone calls.  And iPhone and iPad users don&#039;t escape entirely unscathed.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-12-15T17:17:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:48:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/cloudatalas-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/cloudatalas-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/cloudatalas-400x260.jpeg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/\",\"name\":\"Don't Jailbreak Your iPhone if You Want to Avoid the Cloud Atlas Malware - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/#primaryimage\"},\"datePublished\":\"2014-12-15T17:17:37+00:00\",\"dateModified\":\"2016-02-12T18:48:33+00:00\",\"description\":\"Cloud Atlas is the latest purported example of sophisticated state-sponsored malware, said to have snooped on diplomats, oil industry workers and the financial industry, intercepting communications and recording phone calls. And iPhone and iPad users don't escape entirely unscathed.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Don&#8217;t Jailbreak Your iPhone if You Want to Avoid the Cloud Atlas Malware\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"Don&#8217;t Jailbreak Your iPhone if You Want to Avoid the Cloud Atlas Malware\",\"datePublished\":\"2014-12-15T17:17:37+00:00\",\"dateModified\":\"2016-02-12T18:48:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/#webpage\"},\"wordCount\":564,\"commentCount\":8,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/cloudatalas-400x260.jpeg\",\"keywords\":[\"Android\",\"Apple\",\"BlackBerry\",\"Cloud Atlas\",\"Inception\",\"iOS\",\"iOS Malware\",\"iOS\/CloudAtlas\",\"iPhone\",\"Jailbreak\",\"Jailbroken\",\"Malware\",\"Spyware\",\"Windows\"],\"articleSection\":[\"Malware\",\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Cloud Atlas is the latest purported example of sophisticated state-sponsored malware, said to have snooped on diplomats, oil industry workers and the financial industry, intercepting communications and recording phone calls.  And iPhone and iPad users don't escape entirely unscathed.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/","og_locale":"en_US","og_type":"article","og_title":"Don't Jailbreak Your iPhone if You Want to Avoid the Cloud Atlas Malware - The Mac Security Blog","og_description":"Cloud Atlas is the latest purported example of sophisticated state-sponsored malware, said to have snooped on diplomats, oil industry workers and the financial industry, intercepting communications and recording phone calls.  And iPhone and iPad users don't escape entirely unscathed.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-12-15T17:17:37+00:00","article_modified_time":"2016-02-12T18:48:33+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/cloudatalas-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/cloudatalas-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/cloudatalas-400x260.jpeg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/","name":"Don't Jailbreak Your iPhone if You Want to Avoid the Cloud Atlas Malware - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/#primaryimage"},"datePublished":"2014-12-15T17:17:37+00:00","dateModified":"2016-02-12T18:48:33+00:00","description":"Cloud Atlas is the latest purported example of sophisticated state-sponsored malware, said to have snooped on diplomats, oil industry workers and the financial industry, intercepting communications and recording phone calls. And iPhone and iPad users don't escape entirely unscathed.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Don&#8217;t Jailbreak Your iPhone if You Want to Avoid the Cloud Atlas Malware"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"Don&#8217;t Jailbreak Your iPhone if You Want to Avoid the Cloud Atlas Malware","datePublished":"2014-12-15T17:17:37+00:00","dateModified":"2016-02-12T18:48:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/#webpage"},"wordCount":564,"commentCount":8,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/cloudatalas-400x260.jpeg","keywords":["Android","Apple","BlackBerry","Cloud Atlas","Inception","iOS","iOS Malware","iOS\/CloudAtlas","iPhone","Jailbreak","Jailbroken","Malware","Spyware","Windows"],"articleSection":["Malware","Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/dont-jailbreak-your-iphone-if-you-want-to-avoid-the-cloud-atlas-malware\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/cloudatalas-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-92l","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/34741"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=34741"}],"version-history":[{"count":9,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/34741\/revisions"}],"predecessor-version":[{"id":34783,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/34741\/revisions\/34783"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/34747"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=34741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=34741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=34741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}