Researcher sends malicious app into Apple App Store

Sneaking past Apple's App Store proves successful, but the researcher who discovers the flaw is thrown off the iOS developer programme.

iPhone 4S

A software hole in Apple's iPhone and iPad devices may permit developers to break through the App Store gates and control the device.

Security researcher Charlie Miller discovered the flaw, allowing developers to bypass the code signing restrictions and secretly install malware onto Apple devices.

"The flaw I found allows apps in the App Store to download new code and run it even if it's not signed or even if it hasn't been checked by Apple," Miller said in his YouTube clip below.

"Until now you could just download everything from the App Store and not worry about it being malicious. Now you have no idea what an app might do," said Miller.

Miller demonstrated the flaw by using a stock price checking application he created, InstaStock, which was approved even though it contained features to download unapproved code.

The app's code could let a hacker download an address book, view pictures, access other data and even make the phone vibrate.

Despite attempting to highlight security flaws in Apple's systems, because he had broken Apple's App Store rules, Miller was thrown off the iOS developer programme.

"Apple just kicked me out of the iOS Developer program. That's so rude," Miller tweeted on Monday. "First they give researcher's access to developer programs, (although I paid for mine) then they kick them out for doing research. Me angry."

"Just found out not only am I kicked out, I can't come back for a year. 1 year suspension," Miller tweeted today.

Apple has now removed the app from its App Store.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

How LogPoint uses MITRE ATT&CK
Whitepaper

How LogPoint uses MITRE ATT&CK

15 Jan 2021
Hackers using COVID vaccine as a lure to spread malware
hacking

Hackers using COVID vaccine as a lure to spread malware

15 Jan 2021
Cyber criminals bypassing MFA to access cloud service accounts
two-factor authentication (2FA)

Cyber criminals bypassing MFA to access cloud service accounts

14 Jan 2021
Weekly threat roundup: Microsoft Defender, Adobe, Mimecast
vulnerability

Weekly threat roundup: Microsoft Defender, Adobe, Mimecast

14 Jan 2021

Most Popular

IT retailer faces €10.4m GDPR fine for employee surveillance
General Data Protection Regulation (GDPR)

IT retailer faces €10.4m GDPR fine for employee surveillance

18 Jan 2021
Should IT departments call time on WhatsApp?
communications

Should IT departments call time on WhatsApp?

15 Jan 2021
BT faces £600m class-action lawsuit for 'overcharging'
Policy & legislation

BT faces £600m class-action lawsuit for 'overcharging'

18 Jan 2021