CLamXav found the Worm.Redirect-1 virus in an app on my iPhone during a backup. What now?

During a recent encrypted backup of my iPhone 4S to my Mac Mini, ClamXav found the Worm.Redirect-1 virus in my Ask Dave, Mac Reference app, which I did happen to open last week. It quarantined the app to the folder I have set up and I have since deleted the app from my iPhone, iPad, iTunes and I have also hidden it from my list of purchased apps in the app store. I have backed up my iPhone once since then, and nothing else has shown up. Interestingly, I did a hard reset on my iPhone last night and I noticed a reference to the app in the sys.log, but I didn't catch which process made the call to it. The only visible reference to the virus since then is from the daily ClamXav scans which finds the app in my Trash folder, where I have since moved it.
So, I'm not sure what may have happened to my iPhone, iPad, Mac Mini, or anything else I have attached to my home network, as a result of this virus. Any thoughts on what I should do now?

JimmySD wrote:
I suppose that's good news, since my iPhone is not jail broken. Though I would like to know how it not only got into the app, but how it also got into the App Store too. Should I contact Apple and the developer to let them know about this?
It can't hurt.
The signature is specific, although I suppose it's possible to be found in a false positive:
TARGET TYPE: ANY FILE
OFFSET: *
DECODED SIGNATURE:
On{WILDCARD_ANY_STRING(LENGTH<=10)}RewriteCond^%{HTTP_REFERER}{WILDCARD_ANY_STRI NG(LENGTH<=30)}RewriteCond^%{HTTP_REFERER}{WILDCARD_ANY_STRING(LENGTH<=30)}Rewri teCond^%{HTTP_REFERER}{WILDCARD_ANY_STRING(LENGTH<=30)}RewriteCond^%{HTTP_REFERE R}{WILDCARD_ANY_STRING(LENGTH<=200)}RewriteRule^.* http://
I substituted "^" for spaces to prevent this entry from being identified as infected.
It's a relatively old definition, added 12 Mar 2009 associated with three Trojans.
Submission-ID: 7141005
Sender: Anonymous
Added: Worm.Redirect-1
Added: Trojan.FakeAV-80
Added: Trojan.BHO-4408
Added: Trojan.FakeAV-81
I concur with everybody else that it's unlikely this could harm your iPhone. I can guess that the original purpose was to redirect a browser to a command and control web site that would attempte to download one or more of the Trojan's listed. In 2009, practiacally all Trojan's were being written for use on a Windows computer, but of course it's possible the code could have been re-used and adapted for a different use today.

Similar Messages

Maybe you are looking for

  • Stock report with date range

    Hi Experts. Material stock report (unrestricted, blocked, quality) with in date range. getting information in T-CODE:  MB52 but not in date range. In mard table i did't find the date for unrestricted, blocked and quality. from where can i get that in

  • HT1414 while backing up an error occurs displaying that data could not be backed up due to an unknown error(-25).

    while backing up with itunes, it displays that itunes could not back up data as unknown error(-25) occured..please find a fix to this problem.. also after syncing iphone,time on iphone changes..

  • PROBLEMS JAXB and XML-schema

    Hello, I think my problem is not directly related to JAXB but to my understanding of schema-files. I defined a schema like that: <xsd:complexType name="BSR"> <xsd:sequence> <xsd:element name="VERB" type="VERB"/> <xsd:element name="NOUN" type="NOUN"/>

  • Lightroom export and copyright symbol

    Why copyright symbol ©  from my metadata preset looks like (c) in the  properties menu of the file after exporting photo? ( I can see this (c)  in the properties menu- summary of the file) I'm using Lightroom 3.2. and Windows XP. Thanks.

  • Hyperion Enterprise 6.5.1.1 performance?

    Hi! Is anyone using Hyperion Enterprise/Hyperion Enterprise Reporting 6.5.1.1? On Windows 2008 64-bit R2 Standard servers? If yes- have You experienced any performance issues/errors? Thank You! Zigmunds Edited by: 1007063 on May 29, 2013 9:55 AM