5G Technology World

  • 5G Technology and Engineering
  • FAQs
  • Apps
  • Devices
  • IoT
  • RF
  • Radar
  • Wireless Design
  • Learn
    • 5G Videos
    • Ebooks
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Handbooks
    • 2024
    • 2023
    • 2022
    • 2021
  • Resources
    • Design Guide Library
    • EE World Digital Issues
    • Engineering Diversity & Inclusion
    • Engineering Training Days
    • LEAP Awards
  • Advertise
  • Subscribe

‘Key Raider’ Malware Targets Jailbroken iOS Devices

By Diana Goovaerts | September 2, 2015

Cyber Security company Palto Alto Networks and amateur Chinese tech group WeipTech have uncovered a malware theft of over 225,000 valid Apple accounts, Palo Alto Networks Security Researcher Claud Xiao revealed in a Sunday evening blog post.

According to the post, the iOS malware, dubbed “KeyRaider,” takes aim at jailbroken Apple devices and taps into system processes through MobileSubstrate, stealing “Apple account usernames, passwords and device GUID by intercepting iTunes traffic on the device.”

The malware also snatches Apple push notification certificates, private keys, and also steals and shares App store purchasing information. The virus can also disable local and remote unlocking functions on iPhones and iPads, preventing users from accessing their devices once they’ve been hijacked.

The malware appears to have impacted iOS users in 18 countries, including China, Japan, Germany, Canada and the United States.

With access to a user’s Apple account and password, Xiao said attackers can launch additional strikes against users, including using the information to “control the device through iCloud and compromise the victim’s private data contained in their iMessage logs, contacts, photos, emails, documents and location.”

Research into the incident by Palto Alto Networks and WeipTech has suggested that nearly 20,000 users of two iOS jailbreak tweaks – which allow users to perform actions that normally aren’t possible on iOS – have access to the stolen credentials.

According to Xiao, the incident is believed to be the largest known Apple account theft.

“It’s important to remember that KeyRaider only impacts jailbroken iOS devices,” Xiao wrote. “Users of non-jailbroken iPhones or iPads will not be affected by this attack.”

If the malware is detected on a device, Xiao suggested that users should “change their Apple account password after removing the malware, and enable two-factor verifications for Apple IDs”.

But Xiao said the best method of protection is prevention.

“Our primary suggestion for those who want to prevent KeyRaider and similar malware is to never jailbreak your iPhone or iPad if you can avoid it,” he wrote.

Related Articles Read More >

High-directivity couplers optimized for 225 – 750 MHz applications
Integrated into IoT devices, iSIM poised to make inroads
Triple-radio and multiprotocol MCUs add application processors
5G vectors
How RedCap fits into 5G and IoT

Featured Contributions

  • Overcome Open RAN test and certification challenges
  • Wireless engineers need AI to build networks
  • Why AI chips need PCIe 7.0 IP interconnects
  • circuit board timing How timing and synchronization improve 5G spectrum efficiency
  • Wi-Fi 7 and 5G for FWA need testing
More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: Internet of Things
Explore practical strategies for minimizing attack surfaces, managing memory efficiently, and securing firmware. Download now to ensure your IoT implementations remain secure, efficient, and future-ready.

EE LEARNING CENTER

EE Learning Center
“5g
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

Engineering Training Days

engineering
“bills
5G Technology World
  • Enews Signup
  • EE World Online
  • DesignFast
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Microcontroller Tips
  • Analogic Tips
  • Connector Tips
  • Engineer’s Garage
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips
  • About Us
  • Contact Us
  • Advertise

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy

Search 5G Technology World