First-Ever Trojan in iOS Discovered, Stealing Face ID Data for Bank Account Intrusion
Austin JayIn the ever-evolving landscape of cybersecurity threats, iPhone users face a new adversary: GoldPickaxe. Originating as an Android trojan known as GoldDigger, this sophisticated malware has undergone significant modifications, becoming the first banking trojan tailored to exploit iOS devices.
Recent findings by Group-IB shed light on the trojan's enhanced capabilities, marking a concerning development in cross-platform cyber threats.
GoldPickaxe, a refined iteration of GoldDigger, has emerged as a potent threat to Android and iOS users. Initially discovered in October, the trojan has since evolved, earning its name due to its newfound capacity to extract valuable information from victims. Once installed on an iPhone or an Android device, GoldPickaxe engages in malicious activities, collecting sensitive data such as facial recognition information, identity documents, and intercepted text messages. These ill-gotten details are then employed to facilitate unauthorized access to victims' financial and banking applications.
One of the significant technological scares in the Trojan situation is its incorporation of biometric data as potential AI-driven deepfake generators. Criminals can invent realistic voices of the victims to get past the bounds of security systems and accomplish illegal entries into bank accounts.
The cross-platform tactfulness of GoldPickaxe presents a detrimental threat to people regardless of the device (Android and iOS) since the troops' complexities deliver flexibility across systems.
Currently, GoldPickaxe's primary concern is victims in Vietnam and Thailand. Nevertheless, although cybersecurity experts may have a different opinion about this, they say that containing these hackers' resources could only spur them to broaden their operations.
Countries that use English as their official language, like the USA and Canada, could see more of this kind of banking trojan if actions are not taken to stop it.
Also Read: AI Security Pact: US, UK, And Other Countries Sign 'Secure By Design' Agreement
Unlike Android trojans, which commonly leverage malicious apps and phishing attacks, infiltrating iPhones proves more challenging due to Apple's closed ecosystem.
During the initial stages of the GoldPickaxe campaign, hackers exploited Apple's TestFlight platform, a tool for testing applications. This allowed the distribution of the GoldPixaxe.IOS trojan. Yet, the hackers pivoted to more sophisticated tactics as security measures caught up.
With TestFlight access revoked, the cyber criminals turned to social engineering, convincing victims to install a Mobile Device Management (MDM) profile. Businesses' IT departments typically use MDM to manage company devices, providing a gateway for complete control over targeted iPhones. The adaptability of hackers underscores the persistence and ingenuity employed to bypass Apple's stringent security protocols.
The creation of this malware is a pointer to the constant evolution of mobile threats, with attacks spreading to areas that were once considered immune to Android threats. iPhone users are there, before now, at risk of falling victim to these cybercriminals' activity.
Apple may contribute to the solution as the company seeks the problem. At the same time, users need to be very careful regarding cyber security to secure their devices and personal data. By being aware of pitfalls, following security regulations, and exploring the available tools, users can consolidate their iPhones against iOS threats, developing an inexhaustible way to protect themselves from the constantly changing digital threats.
Related Article: Apple's 'NameDrop': Convenient Contact Swapping Or Security Concern?
most read
related stories
more stories from News
Explore the hidden dangers behind Temu's enticingly low prices and extensive product catalog. Learn how to navigate counterfeit concerns, quality pitfalls, and shipping woes to shop smarter in the digital marketplace.
ernest hamiltonGoogle Play Store now features an "Account deletion available" badge on app listings, ensuring users can easily delete their accounts and data both in-app and online. Developers must comply by May 31, 2024, or face penalties. Learn more about these new privacy measures and pricing updates.
ernest hamiltonApple's iOS 18, set to be unveiled at WWDC 2024, promises AI-driven enhancements in Safari, Photos, and Notes, alongside a major Siri update and smart notifications. Discover the groundbreaking features in this anticipated update.
ernest hamiltonDiscover the POCO X6 Pro, a mid-range marvel from Xiaomi, featuring a 6.67-inch AMOLED display, MediaTek Dimensity 8300-Ultra chipset, and 5000mAh battery with 67W fast charging. Read our in-depth review on design, performance, and camera capabilities.
ernest hamiltonGoogle Play Store has increased its app price limit to $999.99 from the previous $400 cap. This change, announced at Google I/O 2024, caters to premium and enterprise apps, offering expanded payment options and potential revenue growth for developers.
ernest hamiltonThe OnePlus Open 2 is scheduled for a Q1 2025 release, featuring a robust new hinge, Snapdragon 8 Gen 4 SoC, high-resolution cover screen, and periscope camera for superior zoom capabilities.
ernest hamiltonRead about the termination of the collaboration between iFixit and Samsung, highlighting fundamental disagreements over repair accessibility, pricing strategies, and data-sharing requirements, reflecting broader debates within the tech industry regarding consumer rights and sustainability.
ernest hamiltonDiscover Oppo's latest Reno12 series, featuring cutting-edge quad-curved displays, robust builds, and powerful camera setups. Explore the engineering excellence and performance prowess of these sleek smartphones, set to redefine the mobile experience.
ernest hamilton