• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Week 1: Course Introduction
      • Week 2: Meterpreter, Avoiding Detection, Client Side Attacks, and Auxiliary Modules
      • Week 3: Social Engineering Toolkit, SQL Injection, Karmetasploit, Building Modules in Metasploit, and Creating Exploits
      • Week 4: Porting Exploits, Scripting, and Simulating Penetration Testing
      • Week 5: Independent Study – Perform Metasploit Attack and Create Presentation
      • Week 6: Ettercap
      • Week 7: Introduction to OWASP’s WebGoat application
    • Second Half of the Semester
      • Week 8: Independent Study
      • Week 9: Introduction to Wireless Security
      • Week 10: Wireless Recon, WEP, and WPA2
      • Week 11: WPA2 Enterprise, Wireless beyond WiFi
      • Week 12: Jack the Ripper, Cain and Able, Delivery of Sample Operating Systems
      • Week 13: Independent Study – Analyze provided Operating System Samples and Create Assessment Report
      • Week 14: Deliver Assessment to Operating System Class either in person or via teleconferenc
  • Assignments
    • Analysis Reports
    • Group Project Report and Presentation
  • Webex
  • Harvard Coursepack
  • Gradebook

MIS 5212-Advanced Penetration Testing

MIS 5212 - Section 001 - Wade Mackey

Fox School of Business

Scareware vulnerability confirmed for iOS 10.2 and Earlier

April 1, 2017 by Loi Van Tran 3 Comments

Apple recently confirmed that there was a vulnerability that allowed hackers to send infinite loop alert messages on the Safari application.  Instead of just affecting the tab that the website was opened it, it affects the entire application making Safari unusable.  Alert such as “Your device has been locked” was used to scare users into buying iTunes gift card and paying the ransom.  The only problem with this is it didn’t actually lock the iOS or encrypt any files. hence the name scareware.  The scammers registered domains and launched the attack from the domains they owned, such as police-pay[.com]. When the user clicks links to those domain, they’ll get a infinite loop alert message.

Well the good thing is Apple recently patched this vulnerability in iOS 10.3.  If you don’t want to update, the other option is to clear your Safari’s cache.

Article: http://www.securityweek.com/ios-scareware-campaign-abuses-safari-vulnerability

Filed Under: Week 11 Tagged With:

Reader Interactions

Comments

  1. Jason A Lindsley says

    April 3, 2017 at 9:21 pm

    Thanks for sharing! I’m glad I recently upgraded to 10.3. I didn’t realize that it addressed 83 vulnerabilities including this one. Good to know.

    Log in to Reply
  2. Vaibhav Shukla says

    April 5, 2017 at 8:44 pm

    Interesting article it actually reminded me about somewhat same vulnerability in android a few years back.In that case the android phone went into infinite loop of rebooting. The attacker lure victims to play malformed media file (.MKV file) using the buggy ‘mediaserver’ plugin. This will cause the mediaserver function to fall into an endless loop beyond the user’s control, forcing the Android device to get slow down until it reboots… again and again.

    Log in to Reply
  3. Mauchel Barthelemy says

    April 9, 2017 at 9:49 am

    Loi, that’s good to know and thanks for sharing. This represents another good reason people should take applying updates seriously. It’s funny that certain people refuse to update their mobile devices’ OS because they are “afraid” certain parts of the user interface no longer look the same.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (35)
  • Week 01 (2)
  • Week 02 (14)
  • Week 03 (13)
  • Week 04 (10)
  • Week 05 (7)
  • Week 06 (29)
  • Week 07 (8)
  • Week 08 (1)
  • Week 09 (6)
  • Week 10 (12)
  • Week 11 (7)
  • Week 12 (4)
  • Week 13 (6)
  • Week 14 (18)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in