{"id":51754,"date":"2016-03-16T23:25:27","date_gmt":"2016-03-17T06:25:27","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=51754"},"modified":"2017-01-06T15:36:07","modified_gmt":"2017-01-06T23:36:07","slug":"acedeceiver-malware-can-infect-non-jailbroken-ios-devices","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/","title":{"rendered":"AceDeceiver Malware Can Infect Non-Jailbroken iOS Devices"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-51820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/AceDeceiver-iOS-Malware.jpg\" alt=\"AceDeceiver iOS Malware\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/AceDeceiver-iOS-Malware.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/AceDeceiver-iOS-Malware-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/AceDeceiver-iOS-Malware-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>I&#8217;ve <a href=\"https:\/\/www.intego.com\/mac-security-blog\/225000-reasons-not-to-jailbreak-your-iphone-ios-malware-in-the-wild\/\" target=\"_blank\">said it before<\/a>, and I&#8217;ll no doubt say it again \u2014 if you care about your iPhone or iPad&#8217;s security, then you won&#8217;t resort to jailbreaking.<\/p>\n<p>Be that as it may, a newly-discovered malware attack, which\u00a0can infect <em>non-jailbroken<\/em> devices without the user&#8217;s knowledge, may have shaken the confidence of many, and sent shivers down the spines of some.<\/p>\n<p>Security researchers at Palo Alto Networks have <a title=\"Link to Palo Alto Networks blog\" href=\"http:\/\/researchcenter.paloaltonetworks.com\/2016\/03\/acedeceiver-first-ios-trojan-exploiting-apple-drm-design-flaws-to-infect-any-ios-device\/\" target=\"_blank\" rel=\"nofollow\">described in detail<\/a>\u00a0a Trojan horse that is capable of infecting factory-configured iPhones and iPads.<\/p>\n<p>The Trojan, dubbed <em>AceDeceiver<\/em>, infects iOS devices in an ingenious way \u2014 exploiting flaws in Apple&#8217;s anti-piracy DRM software, known as FairPlay.<\/p>\n<p>Here is how the researchers describe AceDeceiver&#8217;s novel method of infecting your iPhone or iPad:<\/p>\n<blockquote><p>&#8220;Apple allows users [to] purchase and download iOS apps from their App Store through the iTunes client running in their computer. They then can use the computers to install the apps onto their iOS devices. iOS devices will request an authorization code for each app installed to prove the app was actually purchased. In the FairPlay MITM attack, attackers purchase an app from [the] App Store then intercept and save the authorization code. They then developed PC software that simulates the iTunes client behaviors, and tricks iOS devices to believe the app was purchased by [the] victim. Therefore, the user can install apps they never actually paid for, and the creator of the software can install potentially malicious apps without the user\u2019s knowledge.&#8221;<\/p><\/blockquote>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-51760\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/acedeceiver-infection-method.jpeg\" alt=\"AceDeceiver infection method\" width=\"500\" height=\"244\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/acedeceiver-infection-method.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/acedeceiver-infection-method-150x73.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/acedeceiver-infection-method-300x147.jpeg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>The only silver lining is that it appears that you are only likely to be in the firing line if you connect your iPhone or iPad to your Windows PC and live in China.<\/p>\n<p>Palo Alto Networks has warned, however, that it would be relatively simple for the malicious code to be tweaked to infect victims in other countries too.<\/p>\n<p>For the attack to succeed, the Windows computer\u2014which is to be connected to the iOS device\u2014has to have already been compromised with malware.<\/p>\n<p>The hackers do this, say Palo Alto Networks&#8217;s researchers, with a program called &#8220;\u7231\u601d\u52a9\u624b (Aisi Helper),&#8221; which acts as the &#8220;man-in-the-middle&#8221; of this MITM attack. The potential for using such a method for large-scale attacks against iOS devices has previously been <a title=\"Link to Usenix research paper\" href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/wang_tielei\" target=\"_blank\" rel=\"nofollow\">proposed in research papers<\/a>, but has not been seen in the wild.<\/p>\n<p>Aisi Helper is promoted as software that provides various services for iPhone and iPad owners, including system backup, clean-up, device management and jailbreaking.<\/p>\n<p>However, according to the researchers, Aisi Helper also silently installs a malicious app to any connected iOS devices. Presently, it appears that the malicious app connects to a third-party iOS app and game store that asks users to enter their Apple ID passwords.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-51763\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/enter-your-apple-id.jpeg\" alt=\"Enter your Apple ID\" width=\"500\" height=\"428\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/enter-your-apple-id.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/enter-your-apple-id-150x129.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/enter-your-apple-id-300x257.jpeg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Many of the apps offered in the store are pirated, and \u2014 despite assurances \u2014 passwords entered by users are reportedly sent to servers under the control of Aisi Helper&#8217;s developers.<\/p>\n<p>To aid further in the spread of the malware, the researchers claim that visiting the Aisi Helper website from a desktop computer prompts users to install the client software, which in turn will spread the AceDeceiver Trojan.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-51766\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/aisi-helper-website.jpeg\" alt=\"Aisi Helper website\" width=\"500\" height=\"263\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/aisi-helper-website.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/aisi-helper-website-150x79.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/aisi-helper-website-300x158.jpeg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Meanwhile, if a user visits the website from an iOS device, an enterprise certificate-signed version of the Aisi Helper iOS client is recommended for installation.<\/p>\n<p>The security researchers who uncovered the AceDeceiver Trojan say that it managed to penetrate the official Apple app store, posing as a wallpaper app, and seemingly avoiding detection by Apple&#8217;s Gatekeeper by only executing controversial behaviour if it determined it was running on a device in mainland China.<\/p>\n<h3>What can you do to protect yourself from AceDeceiver?<\/h3>\n<p>Apple removed the three Trojan apps from its App Store in late February, but the Aisi Helper Windows program can still install the apps to non-jailbroken iDevices using the FairPlay MITM attack.<\/p>\n<p>If you ever installed the Aisi Helper software, in either its Windows client or iOS app incarnation, it is probably sensible to remove it and change your Apple ID passwords at your earliest opportunity. Furthermore, it would be wise to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-activate-apple-two-step-verification-for-icloud\/\" target=\"_blank\">enable two-factor authentication for your Apple ID<\/a>.<\/p>\n<p>Users of\u00a0<a href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Intego VirusBarrier<\/a>\u00a0with up-to-date definitions can detect the known components of the malware as <strong>iOS\/AceDeceiver<\/strong>,\u00a0and can detect the W32 tools used for it as\u00a0<strong>W32\/AceDeceiver<\/strong>.<\/p>\n<p>Furthermore, if you are a business, check for unknown or unusual enterprise provisioning profiles and whether any managed Apple devices are showing the following bundle identifiers: aisi.aisiring, aswallpaper.mito, aswallpaper.mito, i4.picture.<\/p>\n<p>Although the threat of AceDeceiver may be small for those of us who are based outside China, or who never attach our iDevices to a Windows computer, there is clearly the potential for this technique to be abused in other attacks by online criminals.<\/p>\n<p>And it is also important to note that it has been possible to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/\" target=\"_blank\">infect non-jailbroken iOS devices with malware<\/a> before.<\/p>\n<p>As we have reported in the past, targeted attacks have used the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/\" target=\"_blank\">ad-hoc<\/a> or <a title=\"Link to Apple link about enterprise provisioning\" href=\"https:\/\/developer.apple.com\/programs\/enterprise\/how-it-works\/\" target=\"_blank\" rel=\"nofollow\">enterprise provisioning<\/a> features that Apple provides for app developers to beta-test their software or companies who wish to roll out their own apps to staff.<\/p>\n<p>These types of attacks, however, were fairly specialised. The methodology used by AceDeceiver has the potential to infect many more iOS users, particularly if other criminals choose to follow in its footsteps.<\/p>\n<p>So, going back to my earlier claim that jailbroken iDevices are less secure than their non-jailbroken cousins \u2014 is that still true in light of AceDeceiver?<\/p>\n<p>Yes, it undoubtedly remains the case that there are good security reasons why you should never jailbreak your device, as you are introducing more risks. It&#8217;s just that those of us who chose not to jailbreak our iPhones and iPads are a little less safe than we thought before.<\/p>\n<hr>\n<p><strong>Editor&#8217;s Update, March 17:<\/strong>\u00a0This post was updated for accuracy and comprehensiveness. See below for details.<\/p>\n<p>The AceDeceiver Trojan functions with a Windows application, parading as an iOS utility, which is able to infect iOS devices with malicious apps. Users are tricked into providing their Apple ID and password, giving attackers access to their credit card numbers and other personal data.<\/p>\n<p>Have you unwittingly dowloaded one of the three infected applications? The following apps were published on the App Store starting last year, appearing as utilities to browse and download wallpapers for your device:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-51847\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/AceDeceiver-Infected-Apps.png\" alt=\"AceDeceiver Infected Apps\" width=\"500\" height=\"165\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/AceDeceiver-Infected-Apps.png 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/AceDeceiver-Infected-Apps-150x50.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/AceDeceiver-Infected-Apps-300x99.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>If you downloaded any of these applications, delete them from your iOS device and iTunes library. <a href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Intego VirusBarrier<\/a> will also detect the Trojan as <strong>iOS\/AceDeceiver<\/strong>.<\/p>\n<p><strong>Editor&#8217;s Update, March 18:\u00a0<\/strong>Intego is experiencing\u00a0high call volume from customers asking about\u00a0anti-virus protection for iPhones and iPads, and whether or not it\u00a0is\u00a0possible to use VirusBarrier for Mac to scan for malware on iOS devices.<\/p>\n<p>While Apple made\u00a0a head scratching decision to\u00a0eliminate the category of anti-virus and anti-malware products from their iOS App Store, and removed\u00a0VirusBarrier iOS, our VirusBarrier for Mac customers are unaffected by this decision.\u00a0VirusBarrier for Mac still scans for viruses on iOS devices; it will find and eradicate viruses found in document directories on iPhones and iPads.<\/p>\n<p>You can scan your iOS devices with VirusBarrier when they are connected directly to your Mac.\u00a0For additional information on how to do this, <a href=\"https:\/\/support.intego.com\/entries\/22637896-VirusBarrier-X8-How-to-scan-iPhone-iPad-and-iPod-Touch\" target=\"_blank\">visit this page<\/a> on our support site.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Newly-discovered malware can infect non-jailbroken devices without the user&#8217;s knowledge, using a novel technique.<\/p>\n","protected":false},"author":34,"featured_media":51829,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,151,5],"tags":[2842,2845,69,2848,86,2851],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Newly-discovered malware can infect non-jailbroken devices without the user&#039;s knowledge, using a novel technique.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AceDeceiver Malware Can Infect Non-Jailbroken iOS Devices - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Newly-discovered malware can infect non-jailbroken devices without the user&#039;s knowledge, using a novel technique.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-17T06:25:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-06T23:36:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/AceDeceiver.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/AceDeceiver.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/AceDeceiver.jpg\",\"width\":400,\"height\":260,\"caption\":\"AceDeceiver\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/\",\"name\":\"AceDeceiver Malware Can Infect Non-Jailbroken iOS Devices - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/#primaryimage\"},\"datePublished\":\"2016-03-17T06:25:27+00:00\",\"dateModified\":\"2017-01-06T23:36:07+00:00\",\"description\":\"Newly-discovered malware can infect non-jailbroken devices without the user's knowledge, using a novel technique.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AceDeceiver Malware Can Infect Non-Jailbroken iOS Devices\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"AceDeceiver Malware Can Infect Non-Jailbroken iOS Devices\",\"datePublished\":\"2016-03-17T06:25:27+00:00\",\"dateModified\":\"2017-01-06T23:36:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/#webpage\"},\"wordCount\":1198,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/AceDeceiver.jpg\",\"keywords\":[\"AceDeceiver\",\"Aisi Helper\",\"iOS\",\"iOS\/AceDeceiver\",\"Malware\",\"W32\/AceDeceiver\"],\"articleSection\":[\"Malware\",\"Recommended\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Newly-discovered malware can infect non-jailbroken devices without the user's knowledge, using a novel technique.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/","og_locale":"en_US","og_type":"article","og_title":"AceDeceiver Malware Can Infect Non-Jailbroken iOS Devices - The Mac Security Blog","og_description":"Newly-discovered malware can infect non-jailbroken devices without the user's knowledge, using a novel technique.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-03-17T06:25:27+00:00","article_modified_time":"2017-01-06T23:36:07+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/AceDeceiver.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/AceDeceiver.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/AceDeceiver.jpg","width":400,"height":260,"caption":"AceDeceiver"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/","name":"AceDeceiver Malware Can Infect Non-Jailbroken iOS Devices - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/#primaryimage"},"datePublished":"2016-03-17T06:25:27+00:00","dateModified":"2017-01-06T23:36:07+00:00","description":"Newly-discovered malware can infect non-jailbroken devices without the user's knowledge, using a novel technique.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"AceDeceiver Malware Can Infect Non-Jailbroken iOS Devices"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"AceDeceiver Malware Can Infect Non-Jailbroken iOS Devices","datePublished":"2016-03-17T06:25:27+00:00","dateModified":"2017-01-06T23:36:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/#webpage"},"wordCount":1198,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/AceDeceiver.jpg","keywords":["AceDeceiver","Aisi Helper","iOS","iOS\/AceDeceiver","Malware","W32\/AceDeceiver"],"articleSection":["Malware","Recommended","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/AceDeceiver.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-dsK","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/51754"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=51754"}],"version-history":[{"count":22,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/51754\/revisions"}],"predecessor-version":[{"id":60970,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/51754\/revisions\/60970"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/51829"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=51754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=51754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=51754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}