Just a few days after the discovery of an iOS vulnerability dubbed as Masque Attack, Apple has responded in a statement regarding the matter by saying the following:

'We designed OS X and iOS with built-in security safeguards to help protect customers and warn them before installing potentially malicious software,' an Apple spokesperson told iMore. 'We're not aware of any customers that have actually been affected by this attack. We encourage customers to only download from trusted sources like the App Store and to pay attention to any warnings as they download apps. Enterprise users installing custom apps should install apps from their company's secure website.'
For those of you who weren’t knowledge about the topic, Masque Attack works by luring a user to install an app outside of the iOS App Store by clicking a phishing link in a text message or email. A user is then typically directed to a website where they are prompted to download the app which will in actuality install a fake app instead of the legitimate one using iOS enterprise provision profiles (making the whole thing virtually undetectable).

The US government even went as far as issuing a warning about the Masque Attack to iOS users recently – a move which has likely urged Apple to finally respond.

Overall, Masque Attack is unlikely to affect the average iOS user as long as Apple’s security features aren’t bypassed. It can also be avoided by staying away from suspicious apps and avoiding links that push towards installing an app outside of Apple’s App Store.

Source: Apple via iMore