{"id":13990,"date":"2018-12-04T10:45:02","date_gmt":"2018-12-04T18:45:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/12\/04\/news-7757\/"},"modified":"2018-12-04T10:45:02","modified_gmt":"2018-12-04T18:45:02","slug":"news-7757","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/12\/04\/news-7757\/","title":{"rendered":"New Scam Apps Take Advantage of iPhone Touch ID"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c058906d537792d054b53fb\/master\/pass\/Fingerprint-171151164.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Mon, 03 Dec 2018 20:50:34 +0000<\/strong><\/p>\n<p><span class=\"lede\">One of the <\/span>joys of <a href=\"https:\/\/www.wired.com\/2013\/12\/touch-id-issues-and-fixes\/\">Touch ID<\/a> is how seamlessly it works. It rarely takes more than an instant to unlock your <a href=\"http:\/\/www.wired.com\/tag\/iphone\">iPhone<\/a> or approve a purchase. But recently a handful of scam apps have turned that ease of use against anyone unlucky enough to download them.<\/p>\n<p>In separately <a href=\"https:\/\/9to5mac.com\/2018\/11\/30\/app-store-heart-rate-scam\/\" target=\"_blank\">reported incidents<\/a>, apps posing as health assistants invite users to use Touch ID before they show a calorie tracker, or take a heart rate measurement, or some other seemingly legitimate function. Once you scan your fingerprint, though, the apps briefly show an in-app purchase popup instead, charging anywhere from $90 to $120, and simultaneously dim the screen to make it hard to see the prompt. In some cases, even if you decline to use Touch ID to enable a feature, the app asks you to tap to continue\u2014and try the in-app payment scam instead.<\/p>\n<p class=\"paywall\">Charging exorbitant, unscrupulous fees within apps violates Apple\u2019s App Store guidelines; the apps in question, innocuously named \u201cHeart Rate Monitor,\u201d \u201cFitness Balance app,\u201d and \u201cCalories Tracker app,\u201d have all been pulled. It\u2019s unclear if they came from separate developers, or one person operating multiple developer accounts. Either way, to pull off the scam they all rely not on malware but on duplicity\u2014and an insight into how we use Touch ID.<\/p>\n<p class=\"paywall\">\u201cAs soon as you put your finger on there, it starts scanning, so it\u2019s ready and acting very quickly,\u201d says Stephen Cobb, senior security researcher at cybersecurity firm ESET, which <a href=\"https:\/\/www.welivesecurity.com\/2018\/12\/03\/scam-ios-apps-promise-fitness-steal-money-instead\/\" target=\"_blank\">wrote about<\/a> two of the bogus apps Monday. \u201cSomeone cleverly figured out they could use the way that\u2019s implemented to get people to do things that they don\u2019t want to do.\u201d<\/p>\n<p class=\"paywall\">Touch ID has long been used for more than just unlocking your iPhone, after all. You <a href=\"https:\/\/www.wired.com\/2016\/11\/apple-pay-will-change-way-brain-thinks-buying-things\/\">use it for Apple Pay<\/a> and for authentication on various apps. It\u2019s fast, it\u2019s easy, and it works, which means you\u2019re less likely to give much thought to using it when an app asks you to. And when you do put your finger on the home button, there\u2019s no extra prompt to confirm that you actually meant to.<\/p>\n<p>&quot;Crooks will often come up with clever ideas to bypass initial screening mechanisms.&quot;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">J\u00e9r\u00f4me Segura, Malwarebytes<\/p>\n<p class=\"paywall\">Cobb compares the scenario to the early days of <a href=\"https:\/\/www.wired.com\/story\/the-curious-comeback-of-the-dreaded-qr-code\/\">QR codes<\/a>, when scanners had no built-in mechanisms to verify where that square of black squiggles would send you. \u201cThis is exactly the same thing,\u201d he says. \u201cThis great idea for a novel form of input, your fingerprint, has been enabled in a wide range of programs. The fact that there\u2019s no confirmation step involved in the way that this input is set up enables you to bypass user confirmation.\u201d<\/p>\n<p class=\"paywall\">It\u2019s unclear how many people actually lost money to the scams, although a recent <a href=\"https:\/\/www.reddit.com\/r\/assholedesign\/comments\/a1h3xf\/this_app_tricks_you_into_asking_for_the\/\" target=\"_blank\">Reddit thread<\/a> indicates that a least a few have. More troubling, though, is the grift\u2019s reproducibility. The App Store\u2019s initial vetting may be thorough, but bad actors still find ways around it, especially after they get that initial approval.<\/p>\n<p class=\"paywall\">\u201cRogue apps are a problem for both iOS and Android, although they tend to be less prevalent for the former due to a more locked down ecosystem,\u201d says J\u00e9r\u00f4me Segura, head of threat intelligence at cybersecurity firm Malwarebytes. \u201cHowever, crooks will often come up with clever ideas to bypass initial screening mechanisms. Over time, they will push out updates to the app and adjust in-app purchases, where most of the problems and abuses lay.\u201d<\/p>\n<p class=\"paywall\">The good news is that anyone with an <a href=\"https:\/\/www.wired.com\/2017\/11\/review-iphone-x\/\">iPhone X<\/a> or later won\u2019t get caught up in the fraud, since those devices don\u2019t have a home button to begin with. To use Apple Pay with Face ID, you need to double-click the side button on those devices.<\/p>\n<p class=\"paywall\">That doesn\u2019t help for older iPhones, though, of which there are plenty still in use. The best anyone with an iPhone 8 or earlier can do is stay vigilant, and only use Touch ID on apps they have reason to trust. Apple, too, could help reduce the likelihood of this type of scam with more stringent ongoing reviews of apps, or by introducing some sort of extra confirmation mechanism to Touch ID, although either of those would create their own frustrations. Which, unless the scale of these cams increases dramatically, may not make sense for Cupertino, especially with Touch ID being gradually phased out as of last year. Apple did not respond to a request for comment.<\/p>\n<p class=\"paywall\">\u201cOnce again, convenience and ease of use brought by new technologies come back to haunt us,\u201d Segura says. \u201cWhile validating payments with the touch of a finger is a seamless experience, it can unfortunately be abused by scammers just as easily.\u201d<\/p>\n<p class=\"related-cne-video-component__dek\">WIRED&#39;s Lauren Goode reviews the latest iPhone models &#8212; the iPhone XS and iPhone XS Max &#8212; and tests the battery life, camera and video capabilities. CORRECTION, Sept. 19, 5:05 PM EST: The video above misstated the water rating for the iPhone XS and XS Max. While the IP68 standard states that devices must be waterproof to more than 1 meter, Apple&#39;s new phones are waterproof up to 2 meters for up to 30 minutes.&quot;<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/iphone-touch-id-scam-apps\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c058906d537792d054b53fb\/master\/pass\/Fingerprint-171151164.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Mon, 03 Dec 2018 20:50:34 +0000<\/strong><\/p>\n<p>Touch ID is seamless, which makes it great for unlocking your phone\u2014and for App Store scammers.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-13990","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13990","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13990"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13990\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13990"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13990"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}