Header Ads

More Than 75 Million iOS Devices Infected With Adware From Third-Party App Store


According to the Trend Micro, security experts reported that a Chinese third-party iOS app store which relies on stolen digital certificates has infected more than 75 million devices with adware by repackaging the popular apps and redistributing them via its website.

More Than 75 Million iOS Devices Infected With Adware From Third-Party App Store

As reported by the experts from Trend Micro, over 75 million iOS-devices infected with adware, distributed by a Chinese third-party iOS app store known as Haima applications, it is a store that relies on stolen digital certificates. The service uses the unpublished application loading device (side-loading), which allows owners of Apple devices to install programs from unofficial sources.
Apple supports App side-loading for the enterprise market to ensure that employees of private companies get the opportunity to use necessary files for customised applications that are not available in the App Store.
Typically, such programs contain corporate information, and Apple will only benefit from the side-loading, as in this case, its devices can be used by the employees of enterprises in the workplace.

Over 75 million iOS users infected
Over 75 million iOS users infected

Chinese service Haima uses side-loading to spread adware. The installation process of the applications is very complex and is based on the Apple issued corporate certificates. Typically, fraudsters make users go through the entire procedure, using social engineering techniques.
In the case of Haima service is switched from one enterprise to another certificate in every three days, since Apple regularly blocks the fake certificates. As a rule, cybercriminals buy stolen certificates on underground hacking forums. The average value of the goods is about $ 300, yes now just think that how much Haima adware earns.
As the security experts of Trend Micro explained that all distributed through the application Haima contain dynamic code responsible for displaying advertisements, usually by InMobi, Mobvista, Adsailer, Chance, DianRu and Baidu. In some cases (for example, in “clone” of the game Pokemon GO), this code also introduces fake GPS data, providing users with the ability to play even in unsupported areas. From this, it follows that the process is not automated, and the developers need to manually implement the code in your application.
According to Trend Micro, over 75 million iOS users have installed apps from the Haima store. Yes, it means that more than 68,870,000 users have already downloaded a modified version of Minecraft Pocket Edition, another 6+ million installed a tampered version of the Terraria app, while over one million installed the previously mentioned Pokemon GO app.

No comments

Powered by Blogger.