Update on July 18 -
Last weekfor all devices running anything from iOS 3.0 to iOS 6.0 (the In-App Purchase program requires iOS 3.0 or later), allowing iPhone, iPad, and iPod touch users to circumvent the payment process and essentially steal in-app content. Apple confirmed the workaround and . Ever since, Cupertino has been working hard to stop the attack, but it has yet to succeed.
First, Apple blocked the IP address of the server used by the Russian hacker. Next, the company issued a takedown request on the hacker's web server and contacted PayPal to prevent users from making donations for keeping the service running. Last but not least, the electronics giant served up a copyright claim against the hacker's video.
Unfortunately for Apple, all of that wasn't enough. Borodin switched to a server located in another country (the first was located in Russia), started taking donations via BitCoin ("PayPal sucks. BitCoin here! 15GCBL7gHbf2p8bapozSrZhNaXdrKUWRFF") as well as ads on in-appstore.com, and uploaded a new video.
He also declared he wants Apple to fix the problem by either changing its APIs or placing new blocks on its service. Borodin told The Next Web that Apple has not contacted him about the issue, and so he is continuing to toy with Cupertino.
The worst part about this hack is that iOS developers have no way of protecting their apps. Using store receiptsas Borodin says his service simply needs a single donated receipt, which it can then use to authenticate anyone's purchase requests. His circumvention technique relies on installing certificates (for a fake in-app purchase server and a custom DNS server), changing DNS settings to allow the authentication of "purchases," and finally emulating the receipt verification server on the Apple App Store.
The iOS apps treat Borodin's server as an official communication because of how Apple authenticates a purchase. There is nothing that ties the purchase directly to a customer or device, meaning a single purchased receipt can be used again and again. In short, this hack means in-app purchase requests are being re-routed as well as approved.
Last but certainly not least, Cupertino is transmitting its customers' Apple IDs and passwords in clear text (Apple assumed it would only ever be communicating with its own server). The following information is transferred from your device to Borodin's server: app restriction level, app id, version id, device guid, in-app purchase quantity, in-app purchase offer name, app identifier, app version, your language, and your locale. Whoever operates in-appstore.com could easily be gathering everyone's iTunes login credentials (as well as unique device-identifying data) in a classic man-in-the-middle attack.
If that's not enough to deter your from using this hack, please think of the developers. You are stealing the majority of revenues from them (70 percent versus Apple's 30 percent cut).
Update on July 18 -
- New Flashback variant silently infects Macs
- New targeted Mac OS X Trojan requires no user interaction
- Over 600,000 Macs infected with Flashback Trojan
- Malicious Chrome extensions hijack Facebook accounts
- Malware tricks Facebook users into exposing credit cards
- Up to 1.5 million Visa, MasterCard credit card numbers stolen