{"id":16694,"date":"2019-10-25T10:45:15","date_gmt":"2019-10-25T18:45:15","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/10\/25\/news-10433\/"},"modified":"2019-10-25T10:45:15","modified_gmt":"2019-10-25T18:45:15","slug":"news-10433","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/10\/25\/news-10433\/","title":{"rendered":"How 18 Malware Apps Snuck Into Apple&#8217;s App Store"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5db206ae60047600090d3a73\/master\/pass\/Security_ios_1126780859.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Fri, 25 Oct 2019 15:43:54 +0000<\/strong><\/p>\n<p class=\"content-header__row content-header__dek\">Sing it loud: The App Store&#39;s not perfect. Especially when it&#39;s up against click fraud code this clever.<\/p>\n<p>Despite some recent <a href=\"https:\/\/www.wired.com\/story\/ios-attack-watering-hole-project-zero\/\">pronounced lapses<\/a>, the <a href=\"https:\/\/www.wired.com\/story\/guide-iphone\/\">iPhone<\/a> remains one of the most secure consumer devices you can buy, thanks in large part to the locked-down ecosystem of the iOS App Store. But things do slip through the cracks\u2014including 18 apps that used evasive maneuvers to sneak past Apple\u2019s defenses.<\/p>\n<p>The malicious apps\u201417 of which were <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.wandera.com\/mobile-security\/ios-trojan-malware\/&quot;}\" href=\"https:\/\/www.wandera.com\/mobile-security\/ios-trojan-malware\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">discovered<\/a> by mobile security company Wandera, all from the same developer, while Apple spotted another using the same technique\u2014have already been taken down. While they were live, they didn\u2019t steal data or gain control of a victim\u2019s device, behavior that other <a href=\"https:\/\/www.wired.com\/story\/imessage-interactionless-hacks-google-project-zero\/\">recent iOS fumbles could have enabled<\/a>. Instead, the apps, which ranged from a calculator to a yoga pose repository, ran invisible ads in the background of the device, generating phony website clicks to inflate ad revenues.<\/p>\n<p>That sort of adware makes regular appearances on Android, in part because that platform\u2019s <a href=\"https:\/\/www.wired.com\/2016\/12\/never-ever-ever-download-android-apps-outside-google-play\/\">third-party app stores<\/a> are riddled with bad actors. On iOS? Not so much. And while the worst effects you\u2019d feel as a victim in this case would be a quicker battery drain and a higher data bill, this latest wave of iOS malware is most notable not for what it does but for how it got there.<\/p>\n<p>&quot;I think this one changed the game a bit for the types of things Apple needs to look for.&quot;<\/p>\n<p>Michael Covington, Wandera<\/p>\n<p>It started small. Wandera&#x27;s security software flagged some unusual activity on a client\u2019s iPhone: A lone speedometer app had made unexpected contact with a so-called command and control server, which had previously <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/news.drweb.com\/show\/?i=13382&amp;lng=en&quot;}\" href=\"https:\/\/news.drweb.com\/show\/?i=13382&amp;lng=en\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">been identified<\/a> as issuing orders to ad fraud malware in a separate Android campaign. In other words, the app had gone rogue.<\/p>\n<p>Wandera worked backwards from there. It identified the developer of the app, India-based AppAspect Technologies, and installed its dozens of offerings on iPhones for further testing. First, static analysis, poring over the code to look for any embedded shenanigans. Then dynamic analysis, looking for any outbound connections to a far-flung server with bad intentions.<\/p>\n<p>\u201cThat\u2019s usually where we see the dodgy activity,\u201d says Michael Covington, Wandera\u2019s vice president of product. \u201cIn this case, we weren\u2019t seeing it.\u201d<\/p>\n<p>Nothing. Not a hint of impropriety. But Wandera continued to press. Its standard testing setup relies on several iPhones connected to Wi-Fi; it\u2019s a lot of downloads, after all, so no reason to chew up all that data. But after striking out in the first round of analyses, the researchers decided to see what happened if they added a SIM card to the equation. And then they waited.<\/p>\n<p>A few days later, 17 of the apps started reaching out to the same adware server.<\/p>\n<p>\u201cThey had the intelligence to not just wait a few days, but to actually wait for other pieces of context to line up in the way that the developer wanted them to,\u201d Covington says. In this case, the presence of a SIM card indicates that the phone belongs to a real person rather than a security researcher\u2014or one of the many humans that screen apps for App Store approval.<\/p>\n<p>It\u2019s a simple evasion, but clever. More important, in this case it was effective. If you downloaded one of these apps, it would act perfectly normal until it was reasonably confident that you\u2019re a genuine mark. At that point, it would reach out to its boss\u2014the command and control server\u2014which would instruct the app to turn your iPhone into an invisible click farm.<\/p>\n<p>In an email, AppAspect Technologies pleaded ignorance, saying that it only found out about the issue after Apple had removed its apps, and that it\u2019s working its way back to compliance. And in fairness, it\u2019s entirely plausible that they had no idea that its apps were behaving this way. Developers sometimes incorporate code from third-party or unauthorized sources to build out their apps; borrowing from the wrong bin can easily\u2014and accidentally\u2014turn a speedometer app into something malicious. Apple\u2019s been through that on a larger scale than this; in 2015, some developer forums hosted <a href=\"https:\/\/www.wired.com\/2015\/09\/hack-brief-malware-sneaks-chinese-ios-app-store\/\">versions of its Xcode software tool<\/a> with data-stealing code appended to it, resulting in dozens of infected apps sneaking onto devices.<\/p>\n<p>Adware\u2019s a less severe problem, and again, it\u2019s downright endemic to Android. Security firm ESET <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/techcrunch.com\/2019\/10\/24\/millions-dozens-android-apps-adware\/&quot;}\" href=\"https:\/\/techcrunch.com\/2019\/10\/24\/millions-dozens-android-apps-adware\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">announced<\/a> just yesterday that it found 42 Google Play Store adware apps, downloaded millions of times. While not unheard of on iOS, it\u2019s much more rare, especially with this level of sophistication.<\/p>\n<p>\u201cThis is an excellent catch,\u201d says Will Strafach, founder of Sudo Security Group and developer of the <a href=\"https:\/\/www.wired.com\/story\/guardian-firewall-ios-app\/\">Guardian Firewall app for iOS<\/a>.<\/p>\n<p>It also illustrates how Apple\u2019s App Store screening process isn\u2019t quite as impregnable as you might assume. Especially when it comes to this specific category of intrusion. \u201cBecause ad fraud does not relate to actually malicious activity for the user, Apple likely does not put a high priority on policing it,\u201d Strafach says.<\/p>\n<p>\u201cThis was outside the parameters that Apple was checking,\u201d says Wandera\u2019s Covington. \u201cI think this one changed the game a bit for the types of things Apple needs to look for.\u201d<\/p>\n<p>For its part, Apple acknowledges that it took down the infringing apps, and that it has updated its screening tools to better detect this kind of verboten activity going forward. But Apple also disputes the &quot;malware&quot; characterization, since ad fraud doesn\u2019t directly disrupt your smartphone experience\u2014or steal data from it\u2014the way that, say, <a href=\"https:\/\/www.wired.com\/story\/ios-hacks-apple-response\/\">pervasive surveillance by an authoritarian state<\/a> might.<\/p>\n<p>Semantics aside, presumably most iPhone owners would prefer that a phalanx of click fraud apps <em>not<\/em> find its way into the App Store. But the incident is a good reminder that it can and does happen.<\/p>\n<p>\u201cI do realize that this is difficult to police and prevent,\u201d says Thomas Reed, director of Mac and mobile research at cybersecurity firm Malwarebytes. \u201cThe problem isn\u2019t so much that these things have happened, which is inevitable. The problem is that people have an unrealistic level of trust in Apple\u2019s App Store\u2014much as people once believed that \u2018Macs don\u2019t get viruses.\u2019\u201d<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/apple-app-store-malware-click-fraud\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5db206ae60047600090d3a73\/master\/pass\/Security_ios_1126780859.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Fri, 25 Oct 2019 15:43:54 +0000<\/strong><\/p>\n<p>Sing it loud: The App Store&#8217;s not perfect. Especially when it&#8217;s up against click fraud code this clever.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21357],"class_list":["post-16694","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-security-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16694","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16694"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16694\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16694"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16694"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16694"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}