'AceDeceiver' iOS Trojan Spotted in China, Bypasses Apple's DRM Mechanism - MacRumors
Skip to Content

'AceDeceiver' iOS Trojan Spotted in China, Bypasses Apple's DRM Mechanism

A new iOS trojan has been found in the wild that's able to infect non-jailbroken iOS devices through PCs without the need to exploit an enterprise certificate. Named "AceDeceiver," the malware was discovered by Palo Alto Networks and is currently affecting iOS users in China.

AceDeceiver infects an iOS device by taking advantage of flaws in FairPlay, Apple's digital rights management (DRM) system. According to Palo Alto Networks, it uses a technique called "FairPlay Man-in-the-Middle," which has been used to spread pirated iOS apps in the past by using fake iTunes software and spoofed authorization codes to get the apps on iOS devices. The same technique is now being used to spread the AceDeceiver malware.

acedeceiverfairplaymitm

Apple allows users purchase and download iOS apps from their App Store through the iTunes client running in their computer. They then can use the computers to install the apps onto their iOS devices. iOS devices will request an authorization code for each app installed to prove the app was actually purchased. In the FairPlay MITM attack, attackers purchase an app from App Store then intercept and save the authorization code.

They then developed PC software that simulates the iTunes client behaviors, and tricks iOS devices to believe the app was purchased by victim. Therefore, the user can install apps they never actually paid for, and the creator of the software can install potentially malicious apps without the user's knowledge.

From July of 2015 to February of 2016, three AceDeceiver iOS apps were uploaded to the official iOS App Store, posing as wallpaper apps and providing attackers with a fake authorization code to use in the AceDeceiver attacks.

A Windows iPhone management app called "Aisi Helper" that claimed to provide services like system backup and cleaning was installed by users in China, and it went on to install malicious iOS apps on connected devices. The apps were designed to be third-party App Stores with free content to bait users into using them and submitting their Apple IDs and passwords. Apple ID information was then uploaded to the AceDeceiver server.

Though Apple removed the original AceDeceiver iOS apps from the App Store in February (the ones used by the hackers to obtain the authorization codes), the attack remains active because attackers still have the authorization codes necessary to install fake apps on iOS devices. AceDeceiver only affects users in China, but Palo Alto Networks believes the AceDeceiver trojan or similar malware could spread to additional regions in the future. AceDeceiver is especially insidious as it has not been patched (and could work on older versions of iOS even when patched), installs apps automatically from an infected computer, and does not require an enterprise certificate.

acedeceiveriosapp

An AceDeceiver third-party App Store app installed automatically on an iOS device through a computer using the Aisi Helper Malware

AceDeceiver in its current incarnation requires users to download the Aisi Helper Windows app to their computers before the malware can spread to iOS devices, so people who have downloaded this software should remove it immediately and change their Apple ID passwords. In the future, AceDeceiver can be avoided by not downloading suspicious software.

Palo Alto Networks has a full rundown of AceDeceiver, its history, and how it works on the Palo Alto Networks website. It's well worth reading for anyone who wants more information about the malware.

Popular Stories

Apple Event Logo

Apple's Next Era Begins September 1

Thursday May 7, 2026 10:36 am PDT by
Apple recently announced that Tim Cook will be stepping down as CEO later this year, after 15 years of leading the company. Effective September 1, Apple's hardware engineering chief John Ternus will become the company's next CEO, while Cook will become executive chairman of Apple's board of directors. In his new role, Apple said Cook will assist with "certain aspects" of the company,...
Four iPhone 18 Pro Colors Mock Feature

iPhone 18 Pro Launching in September With These 10 New Features

Saturday May 9, 2026 6:03 am PDT by
While the iPhone 18 Pro and iPhone 18 Pro Max are not launching until September, there are already plenty of rumors about the devices. It was initially reported that the iPhone 18 Pro models would have fully under-screen Face ID, with only a front camera visible in the top-left corner of the screen. However, the latest rumors indicate that only one Face ID component will be moved under the...
Apple Watch Series 10 Jet Black Touch ID

Apple Watch Series 12 and watchOS 27: What to Expect Later This Year

Friday May 8, 2026 2:07 pm PDT by
While not too much has been reported about the next Apple Watch models, there are a few rumors about potential design changes and watchOS 27 features. Apple Watch Series 12 and Apple Watch Ultra 4 models are expected to be released in September, and we have outlined some of the key rumored hardware and software changes below. A new Apple Watch SE is not expected this year, as that model was...

Top Rated Comments

OldSchoolMacGuy Avatar
133 months ago
Installing software from a questionable source and get hacked? No way!
Score: 18 Votes (Like | Disagree)
macintoshmac Avatar
133 months ago
"Though Apple removed the apps from the App Store in February, the attack remains active because attackers still have the authorization code,"

This. This is why Apple should never bow down to the FBI in the first place, and make sure that FBI knows this that nothing is secure in this world except content in a person's head. And philosophically, Alzheimer's is one of the the virus/ malware/ trojans that can wreck havoc to that data as well, making nothing at all truly completely secure and safe.

Apple can remove the GovernmentOS but the code once created can and most likely will be out in the wild very soon. That is a risk that nobody should take.
Score: 10 Votes (Like | Disagree)
hfletcher Avatar
133 months ago
So in order for iOS to be infected, you need to install a 'fake' iTunes to begin with?
Score: 10 Votes (Like | Disagree)
133 months ago
Good old China. Can't create or do anything productive so they have to hack others. They really are one of the worst countries on the planet.
Did you really just say that China makes nothing? Since they seem to make everything , what did you mean?
Score: 8 Votes (Like | Disagree)
Norbs12 Avatar
133 months ago
What do you expect... you do shady sh*t without fully understanding it, shady sh*t happens to you.
Score: 8 Votes (Like | Disagree)
Sirious Avatar
133 months ago
Is iOS getting weaker by the day?



Attachment Image
Score: 8 Votes (Like | Disagree)