MILPITAS -- Apple mobile devices can leak users' information through an attack using apps distributed outside the company's App Store, a prominent Silicon Valley security company disclosed Monday.
FireEye announced in a blog post that it told Apple in July that devices using its iOS mobile operating system, such as the iPhone and iPad, were vulnerable to an assault it termed "Masque Attack." However, FireEye researchers said Apple has been unable to work around the issue.
"Because all the existing standard protections or interfaces by Apple cannot prevent such an attack, we are asking Apple to provide more powerful interfaces to professional security vendors to protect enterprise users from these and other advanced attacks," the researchers wrote.
FireEye found that hackers could offer a mobile app through the Web that would mimic a legitimately downloaded application on a user's device, siphoning important information such as login information or emails. An example provided showed that a third-party app called "New Flappy Bird" could replace the Gmail app and access cached emails, using the same "bundle identifier" that Apple uses for the Gmail app.
FireEye said the WireLurker vulnerability disclosed last week by rival Palo Alto Networks, in which a Mac app downloaded from a third-party software store infected connected iOS apps, utilized a form of the Masque Attack vulnerability.
"Masque Attacks can pose much bigger threats than WireLurker," researchers wrote. "Masque Attacks can replace authentic apps, such as banking and email apps, using attacker's malware through the Internet. That means the attacker can steal users' banking credentials by replacing an authentic banking app with malware that has (an) identical (user interface)."
Researchers were also surprised to learn that Masque Attack can access information stored in apps even after the malware has replaced the original app. Factory-installed apps such as Apple's Safari browser don't seem to be susceptible, but any app downloaded from Apple's App Store can be cloned, FireEye said.
FireEye offered three ways to avoid being a victim of the Masque Attack vulnerability: Do not download any apps that do not come from the App Store or a user's organization, such as an employer; don't install apps offered on pop-ups from third-party websites; and if iOS alerts a user about an "Untrusted App Developer," click "Don't Trust" on the alert and immediately uninstall the app.
Cupertino-based Apple did not respond to an email request for comment.
Apple stock dropped 0.2 percent to $108.83 Monday, while FireEye shares gained 5.8 percent to $32.39,