Palo Alto Networks says that "...this malware family heralds a new era in malware" and if the claims are true, the find is indeed significant. It is the first malware to generate malicious iOS applications automatically through binary file replacement and can infect installed iOS applications.
The malware was observed in the Maiyadi App Store, a third-party Mac application store in China. According to the report: "In the past six months, these 467 infected applications were downloaded over 356,104 times and may have impacted hundreds of thousands of users."
According to Palo Alto Networks, WireLurker, running on an OS X system, can install either downloaded third-party applications or automatically generate malicious applications onto a USB-connected iOS device, regardless of whether it is jailbroken.
The malware is able to install malicious and infected programs on non-jailbroken iOS devices, according to the report, by using enterprise provisioning techniques, thus appearing to be an in-house application. The user is presented with a confirmation dialog box such as the one shown below, but otherwise the application will behave the same as an uninfected one.
The goal of the malware is not yet clear. It is capable of much and checks back frequently for updates from a command and control server.
Palo Alto's recommendations are good advice in any event: Don't use third-party app stores, keep operating system software up to date, don't pair iOS devices with untrusted desktop systems and don't accept an unknown enterprise provisioning profile unless an authorized, trusted party explicitly instructs you to do so.
They also recommend using a mobile security application such as their own GlobalProtect.