IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Researcher sends malicious app into Apple App Store

Sneaking past Apple's App Store proves successful, but the researcher who discovers the flaw is thrown off the iOS developer programme.

iPhone 4S

A software hole in Apple's iPhone and iPad devices may permit developers to break through the App Store gates and control the device.

Security researcher Charlie Miller discovered the flaw, allowing developers to bypass the code signing restrictions and secretly install malware onto Apple devices.

"The flaw I found allows apps in the App Store to download new code and run it even if it's not signed or even if it hasn't been checked by Apple," Miller said in his YouTube clip below.

"Until now you could just download everything from the App Store and not worry about it being malicious. Now you have no idea what an app might do," said Miller.

Miller demonstrated the flaw by using a stock price checking application he created, InstaStock, which was approved even though it contained features to download unapproved code.

The app's code could let a hacker download an address book, view pictures, access other data and even make the phone vibrate.

Despite attempting to highlight security flaws in Apple's systems, because he had broken Apple's App Store rules, Miller was thrown off the iOS developer programme.

"Apple just kicked me out of the iOS Developer program. That's so rude," Miller tweeted on Monday. "First they give researcher's access to developer programs, (although I paid for mine) then they kick them out for doing research. Me angry."

"Just found out not only am I kicked out, I can't come back for a year. 1 year suspension," Miller tweeted today.

Apple has now removed the app from its App Store.

Featured Resources

Four strategies for building a hybrid workplace that works

All indications are that the future of work is hybrid, if it's not here already

Free webinar

The digital marketer’s guide to contextual insights and trends

How to use contextual intelligence to uncover new insights and inform strategies

Free Download

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk

Free Download

Building a modern strategy for analytics and machine learning success

Turning into business value

Free Download

Recommended

The Total Economic Impact™ of Apple Mac in Enterprise: M1 update
Whitepaper

The Total Economic Impact™ of Apple Mac in Enterprise: M1 update

12 May 2022
Three lessons the iPod can teach us about disruption
Technology

Three lessons the iPod can teach us about disruption

11 May 2022
Best smartphone 2022: The top handsets from Apple, Samsung, Google and more
Mobile

Best smartphone 2022: The top handsets from Apple, Samsung, Google and more

8 Apr 2022
IT Pro News In Review: The Works cyber attack, Lenovo recruitment drive, old macOS vulnerabilities
cyber security

IT Pro News In Review: The Works cyber attack, Lenovo recruitment drive, old macOS vulnerabilities

8 Apr 2022

Most Popular

Windows Server admins say latest Patch Tuesday broke authentication policies
Server & storage

Windows Server admins say latest Patch Tuesday broke authentication policies

12 May 2022
Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

16 May 2022
IT admin deletes company’s databases and is jailed for seven years
Policy & legislation

IT admin deletes company’s databases and is jailed for seven years

16 May 2022