Category: Apple|Feb 20, 2019 | Author: Admin

Abusing Developer Certificates to Offer Pirate Versions of Popular iPhone Apps

Share on

Illegal versions of apps derive from developer revenue.

Illegal versions of apps derive from developer revenue.

 

Software pirates have long taken over technology designed by Apple to distribute hacked versions of Spotify, Angry Birds, Pokemon Go, Minecraft, and other popular iPhone apps, Reuters reports.

 

Illegal software vendors, such as TutuApp, Panda Helper, AppValley, and Tweakbox should have found ways to abuse digital certificates to access a program that allows businesses to deploy applications to their employees without going through Apple's extensive App Store approval process.

 

Runs the apps for their revenue
The pirates have adopted so-called enterprise certificates available to developers. The result is that they offer modified versions of popular apps for regular consumers. For example, using a modified Spotify version circumvents the pirate's Apple, and the rights holders are deprived of their revenue.

 

Neither TutuApp, Panda Helper, AppValley, or TweakBox have answered Reuter's inquiries.

 

Hard to detect
Apple is not supposed to have the opportunity to monitor the distribution of such certificates, so the spread is virtually impossible to control. The company, however, stops such certificates if they discover that they are being abused.

 

- Developers who abuse our enterprise certificates violate our Developer Enterprise Program Agreement and will have their certificates terminated. They can also be removed completely from our Developer Program, a spokesperson for Apple told the news agency.

 

Apple also states that they continuously evaluate events where such certificates are being abused.

 

- We are immediately ready to take measures, says the spokesperson.

 

Introduces two-factor authentication
Some of these pirates will now be banned from the system, but in retrospect, they have managed to make the pirate apps work again using new certificates.

 

"There is nothing stopping these companies from doing this again from another developer account," said security manager Amine Hambaba of the software company Shape Security.

 

Apple now promises action to stop this abuse. Towards the end of February, the company will introduce two-factor authentication to overcome the problem. It will require a code to be sent to a phone and a password is required to log into developer accounts.

 

So it remains to see if it is enough to stop the pirates.

Sponsored Ads:

Comments:


That's why they dropped their own app

Category: IT|Jul 26, 2024 | Author: Admin

Microsoft Backtracks: Office 365 Connector retirement delayed after developer outcry

Category: Microsoft|Jul 25, 2024 | Author: Admin

How to remove Samsung's new lock

Category: General|Jul 24, 2024 | Author: Admin

Intel: “We have found the bug”

Category: IT|Jul 23, 2024 | Author: Admin

Microsoft blames EU for Windows not being secure

Category: Microsoft|Jul 22, 2024 | Author: Admin

Chip stocks volatile with China-US spat in focus

Category: IT|Jul 21, 2024 | Author: Admin

OpenAI unveils cheaper small AI model GPT-4o mini

Category: IT|Jul 20, 2024 | Author: Admin

“iPhone 15” is struggling

Category: Apple|Jul 19, 2024 | Author: Admin

A new era for mobiles

Category: Google|Jul 18, 2024 | Author: Admin

Has opened for credit card trading of Bitcoin

Category: IT|Jul 17, 2024 | Author: Admin

Now everyone can test the new from Apple!

Category: Apple|Jul 16, 2024 | Author: Admin

Google reportedly is close to buying cybersecurity company Wiz for $23 billion

Category: Google|Jul 15, 2024 | Author: Admin

OpenAI whistleblowers ask SEC to investigate alleged restrictive non-disclosure agreements

Category: IT|Jul 14, 2024 | Author: Admin

Norwegian Vivaldi reaches out to Google

Category: IT|Jul 13, 2024 | Author: Admin

Soon, Apple fans may flee Google, and the other way around

Category: IT|Jul 12, 2024 | Author: Admin
more