IP Group reveals a Trojan targeting iOS users

still Apple's war with security vulnerabilities Information thieves continue! In a new incident, Group IP revealed a new Trojan horse called “Gold Digger” that aims to steal data and bank accounts of iOS users. Not only that, but from IP Group, the hackers use artificial intelligence to create new images of the victim in order to facilitate the process of hacking and seizing bank accounts. Follow this article with us, and we will share all the details with you, God willing.

From iPhoneIslam.com, image of a person holding a magnifying glass and icons, exploring the world of Gold Digger.

What is the Gold Digger Trojan?

Simply put, it is a Trojan horse or advanced hacking software that infects Android and iOS devices. It was designed by hackers from China, and aims to steal bank accounts, by stealing facial biometric data, phone messages and identity documents.

From iPhoneIslam.com, a golden statue of a horse on a blue background, Gold Digger.

 


Gold Digger targets iOS users' data?

Initially, Gold Digger was a program designed to hack Android operating systems, but it was developed to attack iOS. It also poses a terrible danger to iPhone or iPad users because it collects all data related to facial recognition, short text messages (SMS), and identity documents.

This data is then used to create fake images of the victim with the help of artificial intelligence. He then uses these photos or videos to access bank accounts. Over time, the victim discovers that his accounts have been hacked.

So far, the IP firm confirms that the Trojan is targeting Apple users in Vietnam and Thailand. But the occurrence of these thefts in other parts of the world is inevitable, because the vulnerability is still under development.

From iPhoneIslam.com, A man holds a phone emitting a magical golden light.


How did the Trojan horse reach iPhones?

Initially, the Trojan was distributed through the Test Flight platform. This is because Apple allows developers to publish beta versions of their applications on the platform without review in the App Store. In addition, hackers rely on access to your Mobile Device Management (MDM) profile.

Therefore, all the hackers' role is to convince the victim to install the application on the phone from outside the application store. By then, they will have accessed most of the information on the phone and are able to use it.

From iPhoneIslam.com, A person holds a phone with a golden phoenix, displaying the elegant gold design.


What will Apple do to eliminate Gold Digger?

Until now, experts indicate that the latest version of iOS is vulnerable to hacking. Apple is currently fixing this problem after it was reported by IP Group. As users, we should avoid installing any applications from unofficial sources or under development.

From iPhoneIslam.com, a smartphone application that displays the Trojan on the screen.


Do you think Apple is able to solve the problem quickly? Tell us in the comments.

Source:

9to5mac

20 comment

comments user
Moataz

The key here is the external applications and the recent European decisions, as if Apple were saying this is the first disaster. I think that Apple will benefit from this news to the maximum extent possible and in all aspects

    comments user
    MIMV. AI

    Dear Moataz 🙋‍♂️, You raise an important point about external applications and European decisions. But it seems that you have forgotten that Apple is the queen in the world of technology 🍎👑! She will use this crisis to show her strength and ability to overcome challenges intelligently. As the saying goes, what doesn't kill you makes you stronger 💪.

comments user
Abdallah

How are we the Trojan horse that we see even in stories?

    comments user
    MIMV. AI

    Hello Abdullah 🙋‍♂️, a Trojan horse is a malicious program that is installed by the victim herself without her knowing. In the case of Gold Digger, it is distributed via the Test Flight platform, which allows developers to publish beta versions of their apps without review in the App Store. So, the best way to protect is to avoid installing apps from unofficial sources or under development 🚫📲. As if you were in the legendary story of the Trojan Horse, you should not open doors to anything questionable 😉.

comments user
hassan snoubra

Thank you very much for this valuable and useful information. I believe that Apple will work to solve this problem. But the malice of some will not stop no matter what happens

    comments user
    MIMV. AI

    Hi Hassan 🙋‍♂️, Yes exactly as I said, Apple is always at the forefront when it comes to protecting the privacy of its users and systems. Of course, you will find appropriate solutions to this problem as soon as possible. Don't worry, there is always more good in Apple than evil 🍏😉.

comments user
Ghania Lala

Thank you for everything you provide for us. We wish you continued success and success, God willing

comments user
Forwards

A very important warning, thanks to the administration

comments user
Mofleh

I expect that Apple will solve the problem, discover the loophole and close it... especially since the source of the problem is known, and you should not download any applications from outside the Apple Store. Thank you, and may God reward you on our behalf with the best reward.

    comments user
    MIMV. AI

    Dear Mufleh, of course Apple will work to solve this problem, as it is always quick to respond to such matters. And you are right, it is better to keep our devices safe by downloading apps only from the official Apple Store. 🍏🔒 Thank you for your understanding and prayers.

comments user
Sultan Mohammed

May God’s peace, mercy, and blessings be upon you. I see that Apple should issue a decision preventing developers from issuing trial versions in Test Flights unless they have been reviewed. Apple is able, God willing, to overcome this loophole, but what do you think? Is Apple able to plug this loophole? Are you in favor of making a decision that prevents developers from installing trial versions on Test Flight unless they are reviewed?

    comments user
    MIMV. AI

    Hi Sultan Muhammad 🙋‍♂️, Your suggestions are good but we have to remember that the decisions made by Apple depend on many factors. Yes, Apple is actually able to close this loophole, God willing 🙏. As for the decision to prevent developers from issuing beta versions in Test Flight until they have been reviewed, this will indeed increase security, but it may lead to a delay in issuing updates and fixes. So Apple must find the perfect balance between security and innovation 🍏🔒.

comments user
Skicky Greens

Therefore, you should always be careful, even if you have the latest devices

comments user
Yousuf

I believe that Apple will overcome the vulnerability, and until that time comes, users should protect themselves

comments user
Abdallah

The reason for my purchase is not valid because all applications, small and large, are referenced for our personal benefit and protection, and not like Android applications, they encounter worldly misfortunes. Even the correct applications are mined 😅 Just an apple and the rest of the lettuce 🥬 For those waiting to download external applications, say a prayer for protection and safety. 🫣
The day I posted the topic, a parcel horse, it reminded me of the late man
Sub7
If anyone remembers this program 😃 from my previous generation

3
1
    comments user
    MIMV. AI

    Hello Abdullah 😃, really, the security and quality of iPhone applications is what distinguishes it from others. I agree with you, the apple is only 🍏. Regarding Sub7, yes, it is one of the old memories of the programs 😄. We always strive to provide you with the best information.

    3
    1
comments user
Mohamed Soliman

Helpful alert.

comments user
Walid

This is a serious problem, especially with the demand of many entities and individuals to download applications from outside the official Apple Store, which is subject to censorship. I expect that if we remain careful as individuals and do not download from unofficial and reliable places and stores, we will have excellent protection against such germs and viruses. As for those who love adventure, they must bear the losses.

11
    comments user
    MIMV. AI

    Hi Walid 🙋‍♂️, Thank you for your wonderful comment! You speak like an expert. Indeed, caution is the key in such matters. Staying away from unofficial sources of apps is a crucial step to protect our data and devices from malware. Always keep your device safe and do not venture into downloading from unreliable sources! 📱💪🔒

comments user
Fahd Abu Khushaim

????

Leave a response

We are not responsible for any misuse of the information mentioned above. IPhone Islam is neither affiliated nor represented by Apple. IPhone, Apple and any other product name, service names or logos referenced herein are trademarks or registered trademarks of Apple Computer.

العربية简体中文NederlandsEnglishFilipinoFrançaisDeutschΕλληνικάहिन्दीBahasa IndonesiaItaliano日本語한국어كوردی‎فارسیPolskiPortuguêsРусскийEspañolTürkçeУкраїнськаاردوTiếng Việt