Claud Xiao – 03/24/2014
Today, a Chinese security researcher find a strange iOS dynamic library file in his iOS device and post it to PEDIY — the biggest security forum in China. This dynamic library, as a plugin of the Cydia Substrate framework, will replace developer ID (or promotion ID) of popular iOS advertisement SDKs in all other applications running on the infected devices, and bring promotion fee to its author. We think this sample should be classified as malware or adware. As far as we know, this is the first iOS malware based on Cydia Substrate and spread in the wild.
Cydia Substrate is a very popular runtime instrumentation framework for jailbreaked iOS devices which is commonly used by jailbreak community developers to develop powerful tools or special applications for modifing system functions or the OS interface.
This dynamic library, named “spad.dylib”, was found under the directory /Library/MobileSubstrate/DynamicLibraries/. It’s configured to be injected to all applications which use the com.apple.UIKit framework. It uses Cydia Substrate’s API to hook lots of popular advertisement SDKs’ code in all applications which use these SDK to popup advertisement or get statistics of its installation. The sample will modify the developer ID (or “promotion ID”, “refer ID”, “Publisher ID”, “Ad id”) to some specific hard-coded values. We believe these IDs are belongs to the author of this sample. By replace these IDs in other applications, all further advertisements displayed in these applications will be counted as promoted by this author. Thus he will get related promotion fee which should been originally paid to the applications’ real developers.
For example, the sample will inject the MobClick SDK’s “MobClick” class and hook the “startWithAppkey:” and “startWithAppkey:reportPolicy:channelId:” method in it, and change the related app key to “51cd7b8d56240ba38c05d087”. (See figure 1 and figure 2)
All advertisement SDKs targeted by the sample include:
– Sina Weibo
– Umeng MobClick
– Umeng App Union
– MIX SDK
– Google Mobile Ads SDK
– Komli Mobile
The second target in this list, Sina Weibo, is a very popular twitter-liked social network application in China but not an advertisement SDK.
This sample, spad.dylib, begin to spread in the wild at least from Dec 10, 2013, according to an iOS crash report hosted at synapticstuff.com . We still don’t know how it infect the jailbreaded iOS devices. However, as the analysis above, we think it should be classified as malware or adware. Our suggest name of this familiy is iPhoneOS.Spad or iPhoneOS.AdThief.
In the past years, these’re many interesting iOS malware demo/PoC (like the Mactans and the Jekyll) written by the security researchers . However, only a few iOS malware were found in the real world: Ikee, Ikee.b , FindAndCall , and Finfish. This malware becomes a new member of this short list, and is the first one based on Cydia Substrate.
1. I’ve submitted the samples to the contagiominidump, while they havn’t published them yet. You can also download them from:
2. Here’re some statistics of the malware’s infection come from one of my private channels:
i. Infected devices: ~75k
ii. Total activate times: ~22m
iii. Daily activate times (around 3/20/2014): ~22k
1. Mila has uploaded the samples to the contagiominidump:
Also, I added two additional related sample files which is called/invoked by the SpAd.
2. We found a more earlier website refered to this adware, which means it’s spread from Jun 24, 2013:
Thanks Baron tell me this.
3. A person said in the PEDIY’s post that he is the author of this adware, he wrote it a year ago, and didn’t participate in its spreading.
Axelle(@cryptax) find two more adlib in the SpAd: GuoHe and Komli Mobile. Thanks!
Pingback: Evolución de las amenazas informáticas en el primer trimestre de 2014 - Securelist
Pingback: AdThief: iOS-Malware befällt 75.000 Geräte mit Jailbreak - Securelist
Pingback: 75 000 appareils iOS débridés infectés par le programme malveillant AdThief - Securelist
Pingback: Evolution des menaces informatiques au 1er trimestre 2014 - Securelist
Pingback: Evoluzione delle minacce informatiche nel primo trimestre del 2014 - Securelist