Mobile security experts uncover a new and dangerous threat as hackers deploy a Keylogger - also known as a 'keystroke tracker' - to bypass stringent security measures and launch attacks on users' iPhone devices.
Security experts detect a significant threat as hackers utilize a Keylogger.According to a report by Russell Kent-Payne, head of Certo Software - a mobile security company, exploiting this vulnerability allows attackers to record personal messages, browsing history, and even user passwords on iPhones.
The emphasis on this threat is highlighted by security experts following numerous reports from iPhone users falling victim to cyberattacks. The investigation reveals that all affected devices had installed malicious third-party keyboard apps.
Exploiting Apple's TestFlight platform, hackers efficiently distribute malicious keyboard apps.The significant threat arises as hackers don't need direct device infiltration or iCloud access. They simply leverage Apple's TestFlight platform to effectively distribute malicious keyboard apps.
Apple established TestFlight to assist developers in distributing beta versions to a specific user base (up to 10,000 users) before the official App Store launch. However, TestFlight doesn't enforce the same strict security measures as the App Store.
Apple introduced TestFlight to aid developers in distributing beta versions.Compared to the App Store, where all apps undergo rigorous security evaluations to prevent the infiltration of malicious apps, TestFlight becomes a vulnerability. This opens the door for hackers to exploit and execute harmful actions on users' devices.
Once the 'infected' malicious software keyboard is set up on users' devices, it mimics the appearance of the default keyboard and automatically replaces it on the iPhone. This malicious keyboard automatically records every user keystroke and sends that data to the hacker's server.
TestFlight identified as a vulnerability, opening opportunities for hackers to exploit iPhone security.To safeguard themselves, iPhone users should take preventive measures. Firstly, users can check the list of installed keyboards by going to Settings and selecting Keyboards. If an unfamiliar keyboard, especially with full control permissions, is detected, users should immediately uninstall it. It's noteworthy that Apple has not officially commented on this attack method, raising concerns and requiring proactive user alertness and protection.
