NVDA gained a massive 197% since our AI first added it in November - is it time to sell? 🤔Read more

Experts Sound Alarm For iPhone Users: 'GoldDigger' Trojan Debuts On iOS, Utilizing Deepfakes For Bank Theft

Published 16/02/2024, 13:46
© Reuters.  Experts Sound Alarm For iPhone Users: 'GoldDigger' Trojan Debuts On iOS, Utilizing Deepfakes For Bank Theft
AAPL
-

Benzinga - by Rounak Jain, Benzinga Staff Writer.

The first iOS trojan, named “GoldDigger,” affecting Apple Inc.'s (NASDAQ:AAPL) iPhone and iPad users, has been spotted in the wild.

What Happened: According to cybersecurity firm Group-IB, the intent of this GoldDigger trojan is to steal facial recognition data and use AI-generated deepfakes to steal money from bank accounts.

The GoldDigger trojan, initially developed for Android, has now been ported to target iPhone and iPad users. This could be the first trojan developed for iOS, posing a significant threat by collecting facial recognition data, ID documents, and SMS.

Hackers are using this data to create deepfakes with AI-based tools and gain access to victims’ bank accounts.

Initially, the trojan was distributed via Apple’s TestFlight, but after its removal, the hackers adopted a more sophisticated approach using a Mobile Device Management (MDM) profile.

This profile enables hackers to persuade users to install a malicious profile to download an app from outside the App Store, thereby collecting all the necessary data.

Group-IB reports that GoldDigger primarily targets users in Vietnam and Thailand but could potentially attack users worldwide.

The trojan is reportedly in an “active stage of evolution,” and even the latest versions of iOS and iPadOS are vulnerable. Group-IB says it has informed Apple about the trojan, and the company is likely working on a fix.

Why It Matters: This is not the first time Apple’s security has been compromised. In December 2020, the NSO Group exploited an iPhone ‘Zero Click’ vulnerability to hacking three dozen Al Jazeera journalists.

In another incident, Apple’s iPhones were backdoored for four years using the “most sophisticated attack chain” ever seen by cybersecurity researchers at Kaspersky. These incidents underline the importance of robust cybersecurity measures and constant vigilance to protect user data.

Check out more of Benzinga’s Consumer Tech coverage by following this link.

Read Next: iPhone’s Decline In China Continues In 2024 Despite Apple’s Recent Price Cuts: Kuo

Disclaimer: This content was partially produced with the help of Benzinga Neuro and was reviewed and published by Benzinga editors.

Photo courtesy: TheRegisti on Unsplash

© 2024 Benzinga.com. Benzinga does not provide investment advice. All rights reserved.

Read the original article on Benzinga

Latest comments

Risk Disclosure: Trading in financial instruments and/or cryptocurrencies involves high risks including the risk of losing some, or all, of your investment amount, and may not be suitable for all investors. Prices of cryptocurrencies are extremely volatile and may be affected by external factors such as financial, regulatory or political events. Trading on margin increases the financial risks.
Before deciding to trade in financial instrument or cryptocurrencies you should be fully informed of the risks and costs associated with trading the financial markets, carefully consider your investment objectives, level of experience, and risk appetite, and seek professional advice where needed.
Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. The data and prices on the website are not necessarily provided by any market or exchange, but may be provided by market makers, and so prices may not be accurate and may differ from the actual price at any given market, meaning prices are indicative and not appropriate for trading purposes. Fusion Media and any provider of the data contained in this website will not accept liability for any loss or damage as a result of your trading, or your reliance on the information contained within this website.
It is prohibited to use, store, reproduce, display, modify, transmit or distribute the data contained in this website without the explicit prior written permission of Fusion Media and/or the data provider. All intellectual property rights are reserved by the providers and/or the exchange providing the data contained in this website.
Fusion Media may be compensated by the advertisers that appear on the website, based on your interaction with the advertisements or advertisers.
© 2007-2024 - Fusion Media Limited. All Rights Reserved.