| The "WireLurker" malware can install third-party 
				applications on regular, non-jailbroken iOS devices and hop from 
				infected Macs onto iPhones through USB connector-cables, said 
				Ryan Olson, intelligence director for the company's Unit 42 
				division.
 Palo Alto Networks said on Wednesday it had seen indications 
				that the attackers were Chinese. The malware originated from a 
				Chinese third-party apps store and appeared to have mostly 
				affected users within the country.
 
 The malware spread through infected apps uploaded to the apps 
				store, that were in turn downloaded onto Mac computers. 
				According to the company, more than 400 such infected apps had 
				been downloaded over 350,000 times so far.
 
 It's unclear what the objective of the attacks was. There is no 
				evidence that the attackers had made off with anything more 
				sensitive than messaging IDs and contacts from users' address 
				books, Olson added.
 
 But "they could just as easily take your Apple ID or do 
				something else that's bad news," he said in an interview.
 
 Apple, which Olson said was notified a couple weeks ago, did not 
				respond to requests for comment on Wednesday.
 
 Once WireLurker gets on an iPhone, it can go on to infect 
				existing apps on the device, somewhat akin to how a traditional 
				virus infects computer software programs. Olson said it was the 
				first time he had seen it in action. "It's the first time we've 
				seen anyone doing it in the wild," he added.
 
 (Reporting By Sai Sachin R in Bangalore; Editing by Saumyadeb 
				Chakrabarty and Cynthia Osterman)
 
			[© 2014 Thomson Reuters. All rights 
				reserved.] Copyright 2014 Reuters. All rights reserved. This material may not be published, 
			broadcast, rewritten or redistributed. 
				 |  |