Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.


From The Apple Wiki
(Redirected from Unflod.dylib)

Unflod was a malicious piece of software targeting jailbroken iOS devices. It attempts to capture the user's Apple ID and password by using MobileSubstrate to hook into the SSLWrite function of Security.framework and then listening to data passed to it. Once the Apple ID and password are captured, it is sent to a Chinese IP address.

The virus is a library which uses MobileSubstrate to inject itself into processes. It is installed to /Library/MobileSubstrate/DynamicLibraries/Unflod.dylib. Since the virus is just a dynamic library, it can be removed by simply deleting the file. This can be automated by using CoolStar's Un-Unflod Tool[dead link].


The Unflod virus was inadvertently discovered by a Reddit user on 17 April 2014 (2014-04-17). After posting about it, multiple reverse engineers were able to determine that it was indeed malicious. The origin of Unflod is unknown. It is believed to come from Chinese piracy repositories, but the true source is yet to be discovered.

External Resources