Are files scanned for malware during uploads?
malware scans at copy/upload operation?
iPad Air, iPadOS 26
malware scans at copy/upload operation?
iPad Air, iPadOS 26
NventiveGuy wrote:
I wonder if that code was in a machine-language that an Intel chip
in an iOS device could execute.
The cpu on an iOS devices is not an Intel chip. Code built for an Intel chip will not run, and code built for the Apple Silicon chip on the iOS device must be signed to execute.
You say that iOS doesn’t allow such code-execution?
Correct, executable code must be signed by Apple.
I also was told that files like .doc and .docs may also contain code.
The code you are referring to on .doc and .docx files are Virtual Basic scripts and they don't run on iOS. Even a Word document with a legitimate script is not compatible with iOS and will not work if opened in Word for iOS. Some may consider that a disadvantage in iOS since a Word document containing scripts created on a Windows platform will not display correctly on iOS, but that is the way it is. Apple took the same criticism when they launched the iPhone and it would not run Flash documents on the device and that continues to this day.
I assume that most malicious written for other op-systems can NOT run on iOS.
Correct. Not even legitimate code written for another OS can run.
Also I encountered TIFF files that had malware (in Windows)
Probably true. Other platforms can use third party libraries that may be exploited when used to open the picture file that results in a Buffer Overflow error to break out and execute code. It is actually those libraries that are targeted due to a flaw that allows the code to be executed. With iOS, there is a single Framework created by Apple that is responsible for opening Image files (TIFF, JPG, PNG, etc) called Image I/O.
I come from a Windows background where I used to scan files for Malware by doing a right-click on a filename and requesting a scan. Is there nothing in iOS/iPad OS that can do this?
There is not and for good reason. The whole malware scan process is based on identifiable code signatures to detect Malware and that flawed approach means you are always playing a cat-mouse game to update those signatures to prevent Malware. You will never be able to prevent the next Malware exploit using this approach. The solution is to never allow Malware to execute in the first place. You could certainly place a file with a known Windows Malware/Virus in the Files app, but there is nothing that will allow it to execute or interfere with any operations. Just like you could place an .exe file from Windows in the Files app on iOS, and there is nothing that would allow that to execute either.
The paradigm is a completely different approach. If you are looking for a way to prevent flat tires from nails in the road, you don't need to "scan" the road for nails, you create a solid rubber tire where the nails have no effect on your car. Others may certainly miss a nail that will result in a flat, but it has no effect on you. You may even wonder why are they having to "scan" the road for nails?
Is there an Apple doc that describes this in detail?
There are many documents that describe the Security protections used by iOS/iPad OS.
Apple Platform Security - Apple Support
Some key takeaways specific for iOS/iPad OS.
NventiveGuy wrote:
I wonder if that code was in a machine-language that an Intel chip
in an iOS device could execute.
The cpu on an iOS devices is not an Intel chip. Code built for an Intel chip will not run, and code built for the Apple Silicon chip on the iOS device must be signed to execute.
You say that iOS doesn’t allow such code-execution?
Correct, executable code must be signed by Apple.
I also was told that files like .doc and .docs may also contain code.
The code you are referring to on .doc and .docx files are Virtual Basic scripts and they don't run on iOS. Even a Word document with a legitimate script is not compatible with iOS and will not work if opened in Word for iOS. Some may consider that a disadvantage in iOS since a Word document containing scripts created on a Windows platform will not display correctly on iOS, but that is the way it is. Apple took the same criticism when they launched the iPhone and it would not run Flash documents on the device and that continues to this day.
I assume that most malicious written for other op-systems can NOT run on iOS.
Correct. Not even legitimate code written for another OS can run.
Also I encountered TIFF files that had malware (in Windows)
Probably true. Other platforms can use third party libraries that may be exploited when used to open the picture file that results in a Buffer Overflow error to break out and execute code. It is actually those libraries that are targeted due to a flaw that allows the code to be executed. With iOS, there is a single Framework created by Apple that is responsible for opening Image files (TIFF, JPG, PNG, etc) called Image I/O.
I come from a Windows background where I used to scan files for Malware by doing a right-click on a filename and requesting a scan. Is there nothing in iOS/iPad OS that can do this?
There is not and for good reason. The whole malware scan process is based on identifiable code signatures to detect Malware and that flawed approach means you are always playing a cat-mouse game to update those signatures to prevent Malware. You will never be able to prevent the next Malware exploit using this approach. The solution is to never allow Malware to execute in the first place. You could certainly place a file with a known Windows Malware/Virus in the Files app, but there is nothing that will allow it to execute or interfere with any operations. Just like you could place an .exe file from Windows in the Files app on iOS, and there is nothing that would allow that to execute either.
The paradigm is a completely different approach. If you are looking for a way to prevent flat tires from nails in the road, you don't need to "scan" the road for nails, you create a solid rubber tire where the nails have no effect on your car. Others may certainly miss a nail that will result in a flat, but it has no effect on you. You may even wonder why are they having to "scan" the road for nails?
Is there an Apple doc that describes this in detail?
There are many documents that describe the Security protections used by iOS/iPad OS.
Apple Platform Security - Apple Support
Some key takeaways specific for iOS/iPad OS.
There are no true Antivirus Products available for iOS/iPadOS. Those that claim to provide AV protection are little more than “snake oil” - and should generally be avoided. Due to architectural sandboxing, so-called AV for iPadOS cannot escape its own sandbox - and is therefore unable scan the iPad's filesystem for malware code. Security products for iOS/iPadOS typically rely upon an external network proxy (often implemented via a VPN connection).
Due to the system architecture of iOS/iPadOS, unless jailbroken, your iPad is not susceptible to traditional malware infection per-se. However, as with all computer systems, there are still vulnerabilities and exploits to which you remain vulnerable. While your iPad is unlikely to be directly infected by malware, it is still possible to easily download an “infected” file to the iPad - which if transferred elsewhere has the capacity to infect other computer systems with malware.
NventiveGuy wrote:
When I made my 2nd & 3rd posts here on Jan 26, I wasn’t shown
some great replies made the day before. I did see 2 replies, from Nial,
but not from others. Did I just need to refresh my browser tab?
If you had left the tab open, then yes you would need to refresh the page, it will not update automatically. It may also be the case that your Sort Order was set to Rank where the posts are displayed out of order in an attempt to show the most relevant replies on top. I would suggest to check the Sort Order of this thread that shows under your original post just below the Top Ranking Reply. Under Sort By, I use Newest, so the most recent post appears on top of the page in reverse chronological order.
1- I need to run a malware-scanner/remover on the source file system?
I would think I’d need to do that before uploading into iOS.
Correct. Not because the iOS device will be affected by the malware, but because you may choose to transfer that file containing malware to another platform that is susceptible to malware. If the iOS device is the endpoint of the file, there is no need.
2– Does iOS or its apps strip out unsigned/disallowed code from these files?
No. A file containing Malware can be transferred to the Files app and you can then move it to another platform where the Malware will remain. It just will have no effect on iOS.
Also because I don't buy new devices, the ones I buy may have been jailbroken. Is there a way to determine that?
A Factory Reset will reset the device if it had been jailbroken. I prefer doing that when plugged into a computer so the OS is also wiped and replaced. There are other concerns when buying a used device that a Factory Reset will not resolve:
I do use Flash Drives that were no formatted first with iOS. I assume they're FAT 32. I have 1000s of ties on such drives. Should I use an AV app on the source file system to scan them? (before using in iOS)
I see no need to do that from a security standpoint. If you choose to reuse those drives, they should be reformatted instead of just removing all the files. That is simply because they get easily corrupted, not due to a virus, but usually because they were not properly ejected from the file system before removal. They can be used as an additional backup method, but should not be the only backup method due to their volatility.
Mac Jim ID wrote:
NventiveGuy wrote:
Also I encountered TIFF files that had malware (in Windows)
Probably true. Other platforms can use third party libraries that may be exploited when used to open the picture file that results in a Buffer Overflow error to break out and execute code. It is actually those libraries that are targeted due to a flaw that allows the code to be executed. With iOS, there is a single Framework created by Apple that is responsible for opening Image files (TIFF, JPG, PNG, etc) called Image I/O.
Probably a reference to the libTIFF vulnerability from a decade or so ago.
There was an exceedingly clever exploit against iPhone and iPad via a now-fixed flaw in JBIG2 image processing:
https://projectzero.google/2021/12/a-deep-dive-into-nso-zero-click.html
This "weird machine" exploit is among the cleverest exploits I've ever seen reported, too.
Steps were taken here too, including with blastdoor and lockdown.
But looking at this whole discussion more generally, the Windows environment and security model is wildly different than that of iOS and iPadOS. Applying Windows knowledge and assumptions can be problematic.
But should anybody here be targeted by mercenary software, you're going to either have your sensitive information already isolated and segmented, or you're probably going to have a bad day.
About Apple threat notifications and protecting against mercenary spyware - Apple Support
There's more security-reading related available via Citizen Lab, too.
And some related info: Better Securing Your Data, and Apple Acco… - Apple Community
Alas, there's no certainty with security, other than that a completely secure device is also an unusable device.
Not on the iPad itself.
If you're transferring to a Mac, no.
If you're transferring to a PC or uploading to a website, it depends on the software in use.
(262542)
Go load whatever unnecessary and variously privacy-problematic app, if it’ll make you feel better.
It’ll have negligible or no benefits, and these apps tend to be noisy and for no reason other than self-advertising. Adding one, two, or more apps won’t appreciably help things. Those add-on apps might pillage your privacy sure, but that’s seemingly the purpose of too many of the anti-malware apps these days. Though some of what gets sold can make your network wobble.
Put a favorite sticker on your iPad, as it’ll have the same beneficial effects as the add-ons, and likely with fewer adverse effects. 😉
Why? You’re not a target of the expensive malware. Or if you are, you need better and personalized advice than us.
What I’d focus on here? Backups. Better Apple Account security. Two-factor authentication on important accounts. Passkeys where available. Clearing out the list of Apple-generated security recommendations. Did I mention backups? Stuff gets dropped, dunked, lost, stolen, phished or scammed or spear-phished, files accidentally deleted, Apple Accounts lost, and the little people that borrow unlocked devices for games cause all sorts of mayhem, too. This stuff: Better Securing Your Data, and Apple Acco… - Apple Community
I couldn’t post the rest of my response a few minutes ago. Trying again now.
I don’t think you understood a couple important details.
Please let me explain.
In my question, I used the phrase “an AV app on the source file system”.
I meant to indicate “when the source/origin of the file was not iOS, but
was Win/Andr/Lin/ChrOS”.
In other words, when using a file originated on non-iOS system,
it seems the only way to rid that file of malware
is to use an AV app on the system where it originated.
And I’d say do that before uploading into the iOS ecosystem.
(Of course I’m talking about non-iOS malware. You know that, right?)
I have most of my pre-2020 files backed up to both OneDrive and iCloud!
I checked some today, and one subset of them (~8,000 pics, from yr 1900 to 1978)
seem clean. I hope my “quick assessment” is correct!
Once I verify which of the other 17,000 on OneDrive are also on iCloud,
I can totally erase these redundant OneDrive copies! Oh, happy day!
Unfortunately, I doubt those file sets match perfectly. 99.999% unlikely, as I was
also working a bit on Windows until a 2018 hack destroyed my Surface Pro.
After that, I tossed Windows to the curb. I had backed up my OneDrive to
my iCloud in 2017, if my memory serves me correctly. I think I also backed up
my iCloud-unique files to OneDrive, but can’t be sure without a check.
I used Android and ChromeOS for about a year, because
Android offered a 7” phone, and a Samsung/ChrOS tablet was thin & light,
and had an S-pen and really nice keyboard.
Both were beautiful pieces of hardware. I’m a hardware geek!
I have some of those files saved on OneDrive (only, I’d guess),
and some on a couple flash drives. Flash-drive files may only be gdoc files
and some S-pen Notes. Relatively unimportant, but I’ll still look at them.
(I don’t want to lose my research into using an external monitor using Display Port.
Most iOS devices can display using DP-Alt Mode (hardware-wise),
but I’ve not been able to confirm one can use touch on that ext monitor
and have it feed back to the “broadcasting” device.)
I have not uploaded these Andr & ChrOS files to iOS, because:
*I didn’t know how iOS would react to Andr & ChrOS malware.
(Now I believe it doesn’t, and I understand why.)
*I haven’t run any AV check of them on Win/Andr/Lin/ChrOS.
I think I will do that soon, starting with Win+AV at a library.
Those two flash drives I used ~2020-22 are the only place
I stored Android & ChromeOS files I created.
I didn’t want to keep my login to Samsung’s cloud.
There may be a similar reason re: the ChromeOS files.
Some of those are likely in my G Drive. I suppose I will be able
to differentiate between files I created using Google apps on iOS
vs ones I created on Android or ChromeOS. I’ll cross that bridge later.
Or maybe scan every freaking file with Andr, Win, ChrOS, Linux.
Yes, it seems I should read each file with a device that’s running the
“file-originating” OS — and has a good AV app. Tedious, but seems necesary!
I doubt I could recall which OS I used to create each OneDrive file —
that are not also backed up on iOS!!! Even then I should scan all iCloud files
with these systems, right? Who knows where a file originated?!
Oh, and I also have perhaps 1,000 files (mostly pics) on G Drive.
Those I created on iOS with G Drive app, so I’m not as concerned about them.
Again, I share this because I think many are in my boat — now use only iOS devices,
but have files that they originated on other OSs. Or might accept non-iOS files from
others (not likely a problem) and then forward them on to different people (could be
a big problem, because they may know iOS as super-safe, but don’t know that
it passes on existing malware from non-iOS files).
I will draw a big diagram of all these situations, and determine
what to do in each. I’m still using most of my energies on my Grandsons,
one of whom has autism and some ADD. That diagram might be in March,
but I want to get these issues resolved and uncluttered my head sooner!
Cheers! .
Two thoughts come to mind.
I should add some details to this general question.
Last month, I was going to use a house-mate’s printer.
She said the best way was to copy a file onto a flash drive
and then have the printer read the file on the drive.
I used a flash drive that I’d used a couple years ago
to store Android files, using a Samsung S7FE tablet, I now believe.
I got a few different errors when trying to copy my file to the flash.
Here’s another message:
I was trying to create a PNG or JPG version of the iOS file while Sharing it
to the flash, if I recall correctly. Got another error message similar to the 1st,
which I can also upload if that would help.
I called AplCare, and the rep seemed knowledgeable. He said these messages
are ones that iOS would display. I didn’t get a definitive answer to my question
about whether/not files would be malware-scanned when uploaded
(like from a flash drive I have here, modified by Android).
So I used a new, out-of-the-box flash drive, and copied a PNG file to it.
I didn’t receive any errors, and the file printed just fine.
I created the file on an iPad 9th, on which I have LockDown mode enabled.
As I stated in previous postings, I’m working on a device set that’s
about as secure as I can make it. Unfortunately that new iPad isn’t tied to
a new, anonymous phone number. I wasn’t willing to wait while I researched
how to set up a new phone that is paid anonymously.
I wanted to try LockDown sooner than after a week of more research.
If I feel a need to get more secure later, I will do that.
I want to copy a boatload of files I have stored in Google Drive, which
I have installed on another phone (used to have my current number on it).
I don’t know iOS well enough to do that now. I’m open to being convinced.
Can someone send me some official Apple doc(s) that say indeed all files
copied into iCloud are scanned for malware. I might copy my files onto
this flash drive (the one where the file Copy worked, not the one where
the errors were reported). Would that be a safer intermediate step?
Which could also have iOS scan the files twice—one time during the copy to
the flash, and a second time when copied from the flash into iCloud.
At least that’s my assumption — which may not be correct.
Thank you in advance.
I don’t have a Mac or PC.
I quit using Windows years ago when a hacker destroyed a Surface Pro 4
that I was using at a public library. (I did a hard Reset, and it never turned on again.)
I tried a Macbook 10 years ago, and didn’t like the UI.
I believe that someone in this Forum said that MacOS is not as secure
as iOS/iPadOS. Is that true?
Thanks!
It's less-restrictive in terms of where software can be downloaded from and what parts of the disk it can access, but requires the operator's permission for full access and therefore isn't less secure.
Only files with runnable code, which doesn't include photos, can spread malware.
(262543)
To Niel:
I interpret “less restrictive” to conversely mean “more allowed”.
And I assume by “It’s” that you’re talking about
((Copy/Share operations that read files from other devices)).
I have a yuuge desire to understand these situations exactly,
because my security is at stake here.
You said “requires the operator’s permission”, which I infer you mean
that I am the one making the call as to whether a file is safe to load
into my device or iCloud account.
Is there an Apple doc that describes this in detail?
I might be misguided, but I believe it is iOS’s responsibility
to scan a file before storing it in its ecosystem.
Stated conversely, it seems irresponsible that iOS would
NOT malware-scan files before allowing them into its ecosystem.
I come from a Windows background where I used to scan files for malware
by doing a right-click on the filename and requesting a scan.
Is there nothing in iOS/iPadOS that can do this?
or that automatically does it? (which I fully expect)
I ask these questions for myself as well as for 99% of iOS users
who at some point will want to use files that were
generated outside our safe, integrated ecosystem.
Thanks to all who might contribute info!
Also I encountered TIFF files that had malware (in Windows).
I wonder if that code was in a machine-language that an Intel chip
in an iOS device could execute. You may be saying that
iOS doesn’t allow such code-execution? Please be clear for my simple mind.
(Yes I used to write programming manuals for a big corporation, but
I don’t want to read hundreds of pages to get up to speed on iOS security.)
I also was told that word-processor files (like .doc and .docx) may also
contain code. Something about scripts being part of the specification
of what is allowed in those files.
I assume that most malicious code written for other op-systems
can NOT run on iOS. That gives me great comfort, but not total confidence.
Again, I think this applies to many, not just me.
Thanks for your patience!
Reformat the FAT volume, as those can get corrupted all by themselves.
Check whether the printer supports AirPrint and bypass the “fun“ entirely. You can post the vendor and model here. Or can check whether it is accessible when connected to the local Wi-Fi, as AirPrint may well already be enabled by default.
Add-on security apps including VPN apps can introduce as many or more issues as they might avoid.
MrHoffman wrote:
I also agree with your analysis. Certainly mercenary spyware costing close to a $1 million per exploit affecting high profile individuals or those carrying Government secrets is a concern for a few individuals. Also the intentional act of Jailbreaking a device that results in bypassing security measures is not recommended, although there are ways a user may be able to do that.
Since the OP was viewing Malware from a Windows perspective, I wanted to highlight the difference in those platforms and what protections are in place specifically on iOS where the whole concept of viruses that spread in the OS and the need to "scan" for Malware is non existent.
Are files scanned for malware during uploads?