This is the first instance of iOS malware targeting and succeeding in infecting non-jailbroken devices say researchers.
Users can be infected with the malware with the help of the Lingdun worm.
Internet traffic and DNS hijacking is the second method of infection.
It ends up being a successful infection, once the app is downloaded and installed.
Only when the Web was browsed from a home Wi-Fi data pipe did these popups appear.
However, the popups did not show up when a proxied web client was used.
Only a complaint to the ISP can help make the popup disappear.
The third method of infection is by offline app installation.
The Chinese authorities had shut down QVOD, which is a discontinued mobile video player for adult content.
This infection method depends on users downloading the app from iOS app portals and manually installing it.
The malware was first noticed in November 2014, according to Palo Alto researchers.
The malware has been infecting iOS devices for over 10 months.
The malware that has used some of the IP addresses also refer to a few YingMob servers.
source: www.techworm.net