Friday, July 13, 2018

MDM is good - what happens if the MDM platform is compromised? - Attackers can deploy malicious applications remotely (hard but possible with Social Engineering).



According to the researchers, the attackers behind the campaign used the MDM service to remotely install modified versions of legitimate apps onto target iPhones, which were designed to secretly spy on users, and steal their real-time location, contacts, photos, SMS and private messages from chat applications.

Since each step of the enrollment process requires user interaction, such as installing a certificate authority on the iPhone, it is not yet clear how attackers managed to enroll 13 targeted iPhones into their MDM service.

However, researchers at Cisco's Talos threat intelligence unit, who discovered the campaign, believe that the attackers likely used either a social engineering mechanism, like a fake tech support-style call, or physical access to the targeted devices.

https://thehackernews.com/2018/07/mobile-device-management-hacking.html

No comments:

Post a Comment