Akamai Diversity
Home > Web Security > Xsser mRAT Targets iOS and Android for Man-in-Middle Attacks

Xsser mRAT Targets iOS and Android for Man-in-Middle Attacks

Akamai's Prolexic Security Engineering & Response Team (PLXsert) has issued a new advisory about a Xsser mobile remote access Trojan (mRAT) attackers are using to target iOS and Android devices.

The Xsser mRAT is spread through man-in-the-middle and phishing attacks and may involve cellphone tower eavesdropping for location-specific attacks.

Jailbroken iOS devices at risk
Jailbreaking is the process of removing limitations and security checks in the iOS operating system so users can install applications from other application stores. In China, for example, 14 percent of the 60 million iOS devices are estimated to have been jailbroken, often to support the use of third-party Chinese character keyboard apps. Jailbroken phones are at greater risk for malware.

Mobile remote access Trojan: the Xsser mRAT
Formerly, Xsser mRAT targeted only Android devices, but a new variant infects jailbroken iOS devices. The app is installed via a rogue repository on Cydia, the most popular third-party application store for jailbroken iPhones. Once the malicious bundle has been installed and executed, it gains persistence - preventing the user from deleting it. The mRAT then makes server-side checks and proceeds to steal data from the user's device and executes remote commands as directed by its command-and-control (C2) server.

The best protection is to prevent infection
It is difficult to detect whether a phone is under attack from malware such as Xsser mRAT, so a focus on prevention is necessary. Virtual private networks (VPN), two-factor authentication, peer-to-peer proximity networking and commercial phone security applications can provide some protection. Avoiding the use of free Wi-Fi hotspots and automatic connections, ignoring unexpected communications, not jailbreaking phones and not using apps from untrusted sources are some of the self-protection approaches discussed in the advisory.

In the advisory, PLXsert shares its analysis and details, including:
• Open source intelligence about attacks against mobile devices
• How attackers access Android devices
• How attackers access iOS devices
• Man-in-the-middle GSM and CDMA vulnerabilities
• Why jailbroken phones are at high risk
• How Xsser mRAT ends up on mobile phones
• The malicious use of the Cydia repository
• Infection prevention tips

A complimentary copy of the threat advisory is available for download.

Leave a comment