Backdoor:iPhoneOS/XCodeGhost identifies iOS apps that include code introduced when the software was created using a maliciously-modified version of the Xcode app creation framework.
Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.
Find the latest advice in our Community Knowledge Base.
See the manual for your F-Secure product on the Help Center.
Submit a file or URL for further analysis.
In late September 2015, security researchers discovered apps containing malicious code were being offered in the iOS App Store. Further investigation revealed that the apps had been unknowingly created by legitimate developers using a version of the popular Xcode app creation platform that had been modified to silently introduce code into the programs it was used to create. The trojanized Xcode software had been distributed by the attackers on forums that developers often frequented.
Once installed on a user's device, the code-tainted apps were able to read and alter information on the device, as well as silently sending data to remote servers. The majority of the affected users were reportedly from China, though researchers have noted that affected apps were downloaded in other regions as well.
Following news of the discovery, the compromised apps were removed from the App Store.
For more information about the incident, see: