Category: Apple|Feb 20, 2019 | Author: Admin

Abusing Developer Certificates to Offer Pirate Versions of Popular iPhone Apps

Share on

Illegal versions of apps derive from developer revenue.

Illegal versions of apps derive from developer revenue.

 

Software pirates have long taken over technology designed by Apple to distribute hacked versions of Spotify, Angry Birds, Pokemon Go, Minecraft, and other popular iPhone apps, Reuters reports.

 

Illegal software vendors, such as TutuApp, Panda Helper, AppValley, and Tweakbox should have found ways to abuse digital certificates to access a program that allows businesses to deploy applications to their employees without going through Apple's extensive App Store approval process.

 

Runs the apps for their revenue
The pirates have adopted so-called enterprise certificates available to developers. The result is that they offer modified versions of popular apps for regular consumers. For example, using a modified Spotify version circumvents the pirate's Apple, and the rights holders are deprived of their revenue.

 

Neither TutuApp, Panda Helper, AppValley, or TweakBox have answered Reuter's inquiries.

 

Hard to detect
Apple is not supposed to have the opportunity to monitor the distribution of such certificates, so the spread is virtually impossible to control. The company, however, stops such certificates if they discover that they are being abused.

 

- Developers who abuse our enterprise certificates violate our Developer Enterprise Program Agreement and will have their certificates terminated. They can also be removed completely from our Developer Program, a spokesperson for Apple told the news agency.

 

Apple also states that they continuously evaluate events where such certificates are being abused.

 

- We are immediately ready to take measures, says the spokesperson.

 

Introduces two-factor authentication
Some of these pirates will now be banned from the system, but in retrospect, they have managed to make the pirate apps work again using new certificates.

 

"There is nothing stopping these companies from doing this again from another developer account," said security manager Amine Hambaba of the software company Shape Security.

 

Apple now promises action to stop this abuse. Towards the end of February, the company will introduce two-factor authentication to overcome the problem. It will require a code to be sent to a phone and a password is required to log into developer accounts.

 

So it remains to see if it is enough to stop the pirates.

Sponsored Ads:

Comments:


Giant change at Google could change everything

Category: Google|Apr 19, 2024 | Author: Admin

Now Windows will be bothered about this too

Category: Microsoft|Apr 18, 2024 | Author: Admin

Test the new AI trick with Logitech

Category: IT|Apr 17, 2024 | Author: Admin

The US Government Has a Microsoft Problem

Category: Microsoft|Apr 16, 2024 | Author: Admin

Now comes the commercial

Category: Microsoft|Apr 15, 2024 | Author: Admin

Linux Foundation is leading fight against fauxpen source

Category: IT|Apr 14, 2024 | Author: Admin

3000 news articles!!! Happy reading!

Category: General|Apr 13, 2024 | Author: Admin

Google shuts down new product

Category: IT|Apr 12, 2024 | Author: Admin

YouTube CEO warns OpenAI that training models on its videos is against the rules

Category: IT|Apr 11, 2024 | Author: Admin

Google unveils Arm-based data center processor, new AI chip

Category: Google|Apr 10, 2024 | Author: Admin

Microsoft to invest $2.9 bln to expand AI, cloud infra in Japan

Category: Microsoft|Apr 9, 2024 | Author: Admin

Nintendo shuts off online access for 3DS and Wii U today

Category: IT|Apr 8, 2024 | Author: Admin

Musk challenges Brazil's order to block certain X accounts

Category: IT|Apr 7, 2024 | Author: Admin

Here’s how much Microsoft will charge for Win10 security updates once support ends

Category: Microsoft|Apr 6, 2024 | Author: Admin

Samsung has beaten Apple again

Category: IT|Apr 5, 2024 | Author: Admin
more