{"id":49145,"date":"2023-10-05T11:46:57","date_gmt":"2023-10-05T15:46:57","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=49145"},"modified":"2023-10-05T11:46:57","modified_gmt":"2023-10-05T15:46:57","slug":"iphone-illusion-of-security","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/iphone-illusion-of-security\/49145\/","title":{"rendered":"Dangerous illusions of security: is iOS really more secure than Android?"},"content":{"rendered":"<p>Reliable and secure mobile communications are a must for any modern organization, be it a company, a government agency, NGO, whatever. As things stand, the choice is essentially limited to Google\u2019s Android platform or Apple\u2019s iPhones based on iOS. At first glance, the iPhone appears much safer: restrictions on third-party programs; the only tightly controlled marketplace; a fraction of the malware found elsewhere\u2026 But let\u2019s dive deeper to see if this is really the case.<\/p>\n<h2>Is iOS really that secure?<\/h2>\n<p>News about malware infections of Apple devices has become commonplace in recent years, all thanks to the \u201clegal surveillance software\u201d <a href=\"https:\/\/www.kaspersky.com\/blog\/pegasus-spyware\/14604\/\" target=\"_blank\" rel=\"noopener nofollow\">Pegasus<\/a>. But because Pegasus\u2019s victims were mainly activists, politicians and journalists, the threat was treated more as an urban legend \u2014 nasty, yes, but so rare and targeted that the chances of encountering it in reality were tiny (unless you went looking for it). But then it came knocking on our door: in June of this year, we talked about an attack on the Kaspersky management using the <a href=\"https:\/\/www.kaspersky.com\/blog\/triangulation-attack-on-ios\/48353\/\" target=\"_blank\" rel=\"noopener nofollow\">Triangulation malware<\/a> (by the way, at the upcoming Security Analyst Summit we plan to present a detailed analysis of this attack; if you\u2019re interested, <a href=\"https:\/\/thesascon.com\/?utm_source=kdaily&amp;utm_medium=&amp;utm_campaign=gl_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=gl_kdaily_organic_ipg92sgdoyqmcne\" target=\"_blank\" rel=\"noopener nofollow\">join us<\/a>).<\/p>\n<p>Our company \u2014 that is, a privately-owned corporation \u2014 which used iPhones as the standard means of mobile communication, came under attack. After carrying out a <a href=\"https:\/\/securelist.com\/triangledb-triangulation-implant\/110050\/\" target=\"_blank\" rel=\"noopener\">thorough investigation<\/a> and releasing the <a href=\"https:\/\/securelist.com\/find-the-triangulation-utility\/109867\/\" target=\"_blank\" rel=\"noopener\">triangle_check<\/a> utility to automatically search for traces of infection, we set up a mailbox for victims of similar attacks to be able to write to. And the emails poured in from other users of Apple smartphones, claiming that they also found signs of infection on their devices. Trust us \u2014 we no longer perceive targeted attacks on iPhones as rare cases.<\/p>\n<h2>The illusion of security<\/h2>\n<p>Paradoxically, the oft-repeated assertion that iOS is hands-down more secure than Android only makes the situation worse. Public denial of the threat causes people to take their eye off the ball. They say to themselves, \u201cSure, someone got infected, but chances are I won\u2019t.\u201d<\/p>\n<p>Even some of our colleagues (hardly strangers to information security) refused to believe they had been \u201cTriangulated\u201d. Even after the threat was publicized, some had to be persuaded to check their iPhone for traces of the malware, and were genuinely surprised to learn that they had been targeted.<\/p>\n<p>The thought \u201cWhy hack me?\u201d is comforting but dangerous. There could be many reasons. You don\u2019t have to be an <em>interesting target<\/em> yourself to have your phone hacked. It\u2019s enough to be related to a top executive or government official. Sometimes it\u2019s enough to attend meetings or just be physically near the real target of the attack. Then all of a sudden you find yourself in the firing line because important business information leaked from your device.<\/p>\n<h2>The real problem<\/h2>\n<p>A closer look at the vulnerabilities market (be it darknet forums, or some gray platform like Zerodium) reveals that iOS and Android exploits are now roughly equal in price. And this indicates how the attacker market views these systems\u2019 level of security. Some exploits for Android are even more expensive than for iOS. In any case, both systems are viable targets.<\/p>\n<p>The real difference lies in the availability of tools for countering attacks. If attackers exploit the latest zero-day vulnerability to bypass Apple\u2019s vaunted security mechanisms, there\u2019s nothing you can do about it. Most likely you won\u2019t even figure out that it happened at all. Due to system restrictions, even top professionals will have a hard time getting to the bottom of what exactly the attackers were after. Meanwhile, an Android-based smartphone might be equipped with a full-fledged security solution \u2014 not only an antivirus, but also an MDM (mobile device management) solution that allows remote administration of corporate devices.<\/p>\n<p>Getting even more granular, we see that the reputed advantages of iOS in the event of an attack actually turn out to be disadvantages. The closed nature of its ecosystem, off limits to outside security experts, only plays into the hands of attackers. Sure, Apple engineers have built pretty good foolproof protection: the user can\u2019t accidentally go to a malicious site and download a trojanized APK, say. But in the case of iPhone hacks (which, as practice shows, are well within the capabilities of sophisticated attackers), victims can only hope that Apple itself will come to the rescue. Assuming, of course, that it detects the hack in good time.<\/p>\n<h2>The scale of the threat<\/h2>\n<p>The argument that all real-life attacks on iOS thus far have been part of targeted campaigns also fails to reassure. It\u2019s generally accepted that the EternalBlue exploit was developed by a government agency and intended for very narrow application. But then, after being leaked by the Shadow Brokers group, it fell into cybercriminal hands and was used to carry out the global <a href=\"https:\/\/www.kaspersky.com\/blog\/wannacry-history-lessons\/45234\/\" target=\"_blank\" rel=\"noopener nofollow\">WannaCry<\/a> ransomware attack.<\/p>\n<p>Even Apple\u2019s marketplace can no longer be considered impregnable. Our colleagues recently <a href=\"https:\/\/www.kaspersky.com\/blog\/dangerous-apps-in-app-store\/49111\/\" target=\"_blank\" rel=\"noopener nofollow\">found<\/a> a number of scam apps in the App Store which, under certain conditions, phished personal data from the user. Sure, it\u2019s not yet a massive threat, but it sets a precedent: apps bearing a malicious payload were able to bypass Apple\u2019s stringent controls and get published in its official marketplace.<\/p>\n<h2>What to do?<\/h2>\n<p>Having learned the Triangulation lesson, we, like many other private companies and government agencies, are phasing out the use of iPhones for work purposes. As an alternative for now, we\u2019re using Android equipped with our <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">solution<\/a>, which we know is effective. This doesn\u2019t mean we think it\u2019s harder to attack. Just that it\u2019s simpler to protect and certainly easier to detect signs of attack.<\/p>\n<p>This is not a permanent solution \u2014 an add-on to an OS is not ideal. A security solution operates on the principle of acquired immunity: it protects against threats similar to ones already encountered. In a perfect world, everyone would have a mobile phone with innate immunity, which makes unintended actions impossible by design. Alas, there\u2019s no such phone\u2026 <a href=\"https:\/\/os.kaspersky.com\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=gl_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=gl_kdaily_organic_acng0qp92z55dh1\" target=\"_blank\" rel=\"noopener nofollow\">yet<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to choose a secure mobile platform for work.<\/p>\n","protected":false},"author":2750,"featured_media":49146,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051],"tags":[105,14,1250,3124],"class_list":{"0":"post-49145","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-android","10":"tag-apple","11":"tag-ios","12":"tag-mobile-communications"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/iphone-illusion-of-security\/49145\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/iphone-illusion-of-security\/26310\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/iphone-illusion-of-security\/21743\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/iphone-illusion-of-security\/28987\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/iphone-illusion-of-security\/26593\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/iphone-illusion-of-security\/26731\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/iphone-illusion-of-security\/29222\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/iphone-illusion-of-security\/28076\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/iphone-illusion-of-security\/36207\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/iphone-illusion-of-security\/21058\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/iphone-illusion-of-security\/21850\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/iphone-illusion-of-security\/30555\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/iphone-illusion-of-security\/34881\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/iphone-illusion-of-security\/26883\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/iphone-illusion-of-security\/32594\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/iphone-illusion-of-security\/32251\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/ios\/","name":"iOS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/49145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2750"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=49145"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/49145\/revisions"}],"predecessor-version":[{"id":49149,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/49145\/revisions\/49149"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/49146"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=49145"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=49145"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=49145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}