Category: Apple|Feb 20, 2019 | Author: Admin

Abusing Developer Certificates to Offer Pirate Versions of Popular iPhone Apps

Share on

Illegal versions of apps derive from developer revenue.

Illegal versions of apps derive from developer revenue.

 

Software pirates have long taken over technology designed by Apple to distribute hacked versions of Spotify, Angry Birds, Pokemon Go, Minecraft, and other popular iPhone apps, Reuters reports.

 

Illegal software vendors, such as TutuApp, Panda Helper, AppValley, and Tweakbox should have found ways to abuse digital certificates to access a program that allows businesses to deploy applications to their employees without going through Apple's extensive App Store approval process.

 

Runs the apps for their revenue
The pirates have adopted so-called enterprise certificates available to developers. The result is that they offer modified versions of popular apps for regular consumers. For example, using a modified Spotify version circumvents the pirate's Apple, and the rights holders are deprived of their revenue.

 

Neither TutuApp, Panda Helper, AppValley, or TweakBox have answered Reuter's inquiries.

 

Hard to detect
Apple is not supposed to have the opportunity to monitor the distribution of such certificates, so the spread is virtually impossible to control. The company, however, stops such certificates if they discover that they are being abused.

 

- Developers who abuse our enterprise certificates violate our Developer Enterprise Program Agreement and will have their certificates terminated. They can also be removed completely from our Developer Program, a spokesperson for Apple told the news agency.

 

Apple also states that they continuously evaluate events where such certificates are being abused.

 

- We are immediately ready to take measures, says the spokesperson.

 

Introduces two-factor authentication
Some of these pirates will now be banned from the system, but in retrospect, they have managed to make the pirate apps work again using new certificates.

 

"There is nothing stopping these companies from doing this again from another developer account," said security manager Amine Hambaba of the software company Shape Security.

 

Apple now promises action to stop this abuse. Towards the end of February, the company will introduce two-factor authentication to overcome the problem. It will require a code to be sent to a phone and a password is required to log into developer accounts.

 

So it remains to see if it is enough to stop the pirates.

Sponsored Ads:

Comments:


Google has a hidden collection of highly-addictive retro games

Category: Google|Apr 28, 2024 | Author: Admin

Google is officially a $2 trillion company

Category: Google|Apr 27, 2024 | Author: Admin

Snowden: “DO NOT use Reddit!”

Category: IT|Apr 26, 2024 | Author: Admin

Popular Google app used by millions set to close in a few weeks

Category: Google|Apr 25, 2024 | Author: Admin

Cheeky, YouTube!

Category: Google|Apr 24, 2024 | Author: Admin

This is the date Apple will reveal new iPads

Category: Apple|Apr 23, 2024 | Author: Admin

Only possible with VPN

Category: IT|Apr 22, 2024 | Author: Admin

Apple sidles into sideloading in the EU

Category: Apple|Apr 21, 2024 | Author: Admin

Report: Microsoft-OpenAI ownership might get conditional OK from EU regulators

Category: IT|Apr 20, 2024 | Author: Admin

Giant change at Google could change everything

Category: Google|Apr 19, 2024 | Author: Admin

Now Windows will be bothered about this too

Category: Microsoft|Apr 18, 2024 | Author: Admin

Test the new AI trick with Logitech

Category: IT|Apr 17, 2024 | Author: Admin

The US Government Has a Microsoft Problem

Category: Microsoft|Apr 16, 2024 | Author: Admin

Now comes the commercial

Category: Microsoft|Apr 15, 2024 | Author: Admin

Linux Foundation is leading fight against fauxpen source

Category: IT|Apr 14, 2024 | Author: Admin
more