Skip to main content

Stonesoft: Apple’s iOS will see malware in 2011

For years security firms have been predicting that Apple operating systems’ run of luck avoiding almost all malware and spyware would be coming to an abrupt end…and, although it hasn’t happened yet, network security firm Stonesoft is joining McAfee in forecasting 2011 will bring serious threats to Apple’s iOS mobile operating system. But, like all security firms, Stonesoft doesn’t think iOS will be the only security story in 2011: the firm also forecasts more sophisticated malware, increased targeting of smartphone platforms, and an increase in politically motivated attacks.

“The bearing themes in 2010 were definitely Stuxnet, social engineering attacks and advanced evasion techniques, and I am pretty confident that the threats of 2011 will evolve around these themes as well,” says Stonesoft chief information security officer Joona Airamo, in a statement.

Related Videos

Stonesoft forecasts smartphones and particular Apple’s iOS mobile operating system will be targeted by attacks in 2011, as attackers seek personal information, account numbers, and resources increasingly carried around in people’s pockets—and, in many cases, right into the hearts of data centers and enterprise. “As the Apple OS becomes more commonly used, there will be a nasty worm or virus specifically targeted to this operating system,” predicts Stonesoft.

Stonesoft has been waving a flag over what it called “Advanced Evasion Techniques,” which are essentially sophisticated attacks against computers and network services that utilize multiple vectors, no single one of which is sufficient to raise a flag with security software. (A simple example would be fragmenting an attack over multiple TCP streams or packets.) Stonesoft forecasts these techniques will become more commonplace since most network security architecture is currently blind to them—and attackers will continue to use any exploit that works.

Stonesoft also forecasts increased malware attacks via social media like Facebook and Twitter, social engineering against enterprises (including targeted scams run against individual employees), and increased political cyber warfare—although Stonesoft says money will still be the main motivator behind online attacks. Stonesoft forecasts more attacks like Stuxnet that target government, military, and civilian infrastructure. Stuxnet exploited four zero-day vulnerabilities as well as the exploit leveraged by the highly-successful Conficker worm with a level of sophistication that have lead many to speculate it was sponsored by a government. Stuxnet managed to hamstring Iran’s nuclear efforts, and now the New York Times is reporting that Stuxnet was first tested in Israel.

Photo credit: Device Magazine

Editors' Recommendations

Apple’s new sign-in feature brings a secure way to log in to your iOS 13 apps
Sign In with Apple.

At WWDC 2019, Apple is continuing to make its case and push for stronger privacy features. To make it simpler and more secure for iOS 13 users to sign in to apps, Apple is launching a new sign in button called "Sign in with Apple." The tool works like similar social sign-in buttons -- like those that allow users to log into third-party apps with either their Google or Facebook ID -- but adds Apple's twist with a focus on privacy and security.

Most apps and services today require users to either create a user profile or login with a social ID to deliver a unique, customized experience. The former requires comes with a lot of friction, as it requires you to enter a lot of information, while the latter is convenient but could reveal a lot about you.

Read more
Everything Apple announced at WWDC, from iOS 12 to MacOS Mojave
tim-cook-apple-wwdc-2018-getty

 

While the dust has settled on Apple's Worldwide Developer Conference keynote, the show's not over yet -- the conference continues for the next week, and we can expect to see a lot more of Apple's latest developments.

Read more
From pranks to nuclear sabotage, this is the history of malware
An individual surrounded by several computers typing on a laptop.

Since the dawn of modern computing, software has been as capable as the programmers who created it. Their intentions became its capabilities, and that's brought us a world of wondrous and powerful applications across a wide variety of platforms and mediums. Along the way, it's also lead to the creation of incredibly malicious, and in some cases downright dangerous, software. We are, of course, talking about malware.

We've all come across malware at some point. You might’ve been spammed during the heyday of adware and popups, faced off against a nasty trojan that tried to steal your identity, or even dealt with a system-paralyzing piece of blackmailing ransomware. Today, millions upon millions of unique programs are designed to target your system, your files, and your wallet. While they all have different footprints and trajectories, they all have their roots in humble beginnings.

Read more