Researcher sends malicious app into Apple App Store

Sneaking past Apple's App Store proves successful, but the researcher who discovers the flaw is thrown off the iOS developer programme.

iPhone 4S

A software hole in Apple's iPhone and iPad devices may permit developers to break through the App Store gates and control the device.

Security researcher Charlie Miller discovered the flaw, allowing developers to bypass the code signing restrictions and secretly install malware onto Apple devices.

"The flaw I found allows apps in the App Store to download new code and run it even if it's not signed or even if it hasn't been checked by Apple," Miller said in his YouTube clip below.

"Until now you could just download everything from the App Store and not worry about it being malicious. Now you have no idea what an app might do," said Miller.

Miller demonstrated the flaw by using a stock price checking application he created, InstaStock, which was approved even though it contained features to download unapproved code.

The app's code could let a hacker download an address book, view pictures, access other data and even make the phone vibrate.

Despite attempting to highlight security flaws in Apple's systems, because he had broken Apple's App Store rules, Miller was thrown off the iOS developer programme.

"Apple just kicked me out of the iOS Developer program. That's so rude," Miller tweeted on Monday. "First they give researcher's access to developer programs, (although I paid for mine) then they kick them out for doing research. Me angry."

"Just found out not only am I kicked out, I can't come back for a year. 1 year suspension," Miller tweeted today.

Apple has now removed the app from its App Store.

Featured Resources

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Simplify cluster security at scale

Centralised secrets management across hybrid, multi-cloud environments

Download now

The endpoint as a key element of your security infrastructure

Threats to endpoints in a world of remote working

Download now

2021 state of IT asset management report

The role of IT asset management for maximising technology investments

Download now

Recommended

Ryuk behind a third of all ransomware attacks in 2020
Security

Ryuk behind a third of all ransomware attacks in 2020

29 Oct 2020
REvil hacking group says it has made more than $100m in a year
Security

REvil hacking group says it has made more than $100m in a year

29 Oct 2020
36 billion personal records exposed by hacks in 2020 so far
Security

36 billion personal records exposed by hacks in 2020 so far

29 Oct 2020
Trump website defaced in second successive cyber breach
Security

Trump website defaced in second successive cyber breach

28 Oct 2020

Most Popular

Do smart devices make us less intelligent?
artificial intelligence (AI)

Do smart devices make us less intelligent?

19 Oct 2020
Politicians need to stop talking about technology
Policy & legislation

Politicians need to stop talking about technology

21 Oct 2020
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

21 Oct 2020