Threat Descriptons



Category :


Type :


Platform :


Aliases :

Backdoor:iPhoneOS/XCodeGhost.[variant], Trojan.MAC.OSX.XcodeGhost.[variant], XcodeGhost.[variant]


Backdoor:iPhoneOS/XCodeGhost identifies iOS apps that include code introduced when the software was created using a maliciously-modified version of the Xcode app creation framework.


Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

In late September 2015, security researchers discovered apps containing malicious code were being offered in the iOS App Store. Further investigation revealed that the apps had been unknowingly created by legitimate developers using a version of the popular Xcode app creation platform that had been modified to silently introduce code into the programs it was used to create. The trojanized Xcode software had been distributed by the attackers on forums that developers often frequented.

Once installed on a user's device, the code-tainted apps were able to read and alter information on the device, as well as silently sending data to remote servers. The majority of the affected users were reportedly from China, though researchers have noted that affected apps were downloaded in other regions as well.

Following news of the discovery, the compromised apps were removed from the App Store.

For more information about the incident, see:

More Support


Ask questions in our Community .

User Guides

Check the user guide for instructions.

Contact Support

Chat with or call an expert.

Submit a Sample

Submit a file or URL for analysis.