A large number of popular Chinese apps were affected in the security breach Apple has brought down a large number of apps from its store after it was found that around 40 iOS apps had been infected by a modified version of the company’s software for developers.Christine Monaghan, an Apple spokeswoman, told news outlets that the company removed apps from the App Store that it knows have been created with the counterfeit software, to protect its customers.Palo Alto Networks reported last week that a new malware, called XcodeGhost, modified the Xcode integrated development environment for building apps for the Mac, iPhone and iPad.The security firm said Friday that it had found that over 39 apps, including many popular Chinese apps, had been infected by the malware. These included WeChat, a popular chat app from Tencent, Didi Chuxing, developed by Uber’s China rival, and business card scanner CamCard. Some of these apps are used outside China. Tencent said in a blog post that the flaw only affects version 6.2.5 for iOS and not newer versions of WeChat. It said it had fixed the issue and that it had been found during preliminary investigations that there had been no theft or leakage of users’ information or money.Palo Alto said it was cooperating with Apple on the breach and recommended that all iOS developers be aware and take necessary actions. XcodeGhost, which targets compilers, collects information on devices and uploads the data to command and control servers. The mode of attack can also be used to target enterprise iOS or OS X apps in “much more dangerous ways,” Palo Alto researcher Claud Xiao wrote.The security firm said that XcodeGhost was a “very harmful and dangerous” malware that could prompt fake phishing dialogs, open URLs, and read and write clipboard data, which in some cases can be used to read passwords.The malware, first reported on Chinese social-networking site Sina Weibo, was later confirmed by security researchers from Alibaba, according to reports. It isn’t clear how the apps passed Apple’s stringent code review. Apple could not be immediately reached for comment.Some analysts have suggested that the compromised Xcode may have been downloaded from a server in China to get around slow Internet connections to Apple’s own servers. Palo Alto Networks said the modified Xcode was uploaded to Baidu’s cloud file-sharing service for use by Chinese developers. The Chinese company later removed the files. Related content news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Regulation Regulation news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe