Unflod

Unflod was a malicious piece of software targeting jailbroken iOS devices. It attempts to capture the user's Apple ID and password by using MobileSubstrate to hook into the SSLWrite function of Security.framework and then listening to data passed to it. Once the Apple ID and password are captured, it is sent to a Chinese IP address.

The virus is a library which uses MobileSubstrate to inject itself into processes. It is installed to /Library/MobileSubstrate/DynamicLibraries/Unflod.dylib. Since the virus is just a dynamic library, it can be removed by simply deleting the file. This can be automated by using CoolStar's Un-Unflod Tool.

History
The Unflod virus was inadvertently discovered by a Reddit user on April 17th, 2014. After posting about it, multiple reverse engineers were able to determine that it was indeed malicious. The origin of Unflod is unknown. It is believed to come from Chinese piracy repositories, but the true source is yet to be discovered.

External Resources

 * https://www.sektioneins.de/en/blog/14-04-18-iOS-malware-campaign-unflod-baby-panda.html