Palo Alto Networks Research Reveals New Twist On Old Cyberattack Method Targeting Mobile Devices
Santa Clara, Californnia based Palo Alto Networks has revealed details of a new “BackStab” attack used to steal private information from mobile device backup files stored on a victim’s computer. A white paper from the company’s Unit 42 threat intelligence team explains how cyberattackers are using malware to remotely infiltrate computers and execute BackStab attacks in an unprecedented fashion.
Used to capture text messages, photos, geographic location data, and almost any other type of information stored on a mobile device in their possession, BackStab has been employed by law enforcement and cyberattackers alike. The Unit 42 white paper shows how BackStab attacks have evolved to leverage malware for remote access and why Apple iOS devices have been a primary target for attacks, as the default settings in iTunes store unencrypted backup files in fixed locations and automatically sync devices when they are connected to a user’s computer.
Palo Alto Networks reccommends:
• iOS users should encrypt their local backups or use the iCloud backup system and choose a secure password.
• Users should upgrade iOS devices to the latest version, which creates encrypted backups by default.
• When connecting an iOS device to an untrusted computer or charger via a USB cable, users should not click the “Trust” button when the dialog box is displayed.
You can download the white paper at:
http://bit.ly/1OO2igc
Subscribe to Unit 42 research updates at:
http://researchcenter.paloaltonetworks.com/unit42/
Learn more about Unit 42, the Palo Alto Networks threat intelligence team, at:
https://www.paloaltonetworks.com/threat-research.html
For more information, visit:
http://www.paloaltonetworks.com
Source: Palo Alto Networks