Tinian malware is a new malware that was discovered in August 2019 and it targets iOS devices specifically those of Chinese users. The malware is spread through a malicious version of Apple's iTunes software and once it infects a device, it can steal login credentials, bank account details, and other sensitive information. It's capable of persist even after a device is reset to factory settings, this is achieved by installing itself as a root certificate, which allows it to intercept all network traffic from the device. The malware is believed to have been developed by a Chinese APT group... Once the malware is installed on the device it can steal login credentials, bank account details, and other sensitive information. It can also intercept all network traffic from the device, and can even persist even after a device is reset to factory settings. The malware is spread through a malicious version of Apple's iTunes software, specifically it was discovered in a version of the iTunes client that was being distributed on third-party app stores in China. It's believed that the malware was developed by Chinese APT group (Advanced Persistent Threat) which is a type of cyber attack typically associated with state-sponsored hackers. To protect against the Tinian malware and other types of malware, it is recommended that users do not download apps from untrusted sources and be wary of clicking on links in emails or text messages. It is also recommended to keep your iOS device updated to the latest version of iOS, as well as use mobile security software to detect and remove malware.
0 Comments
Your comment will be posted after it is approved.
Leave a Reply. |
Threat Archives
An ever evolving collection of information about mobile threats, vulnerabilities, and exploits for iOS and Android devices. Archives
August 2024
Categories |