You're wrongly assuming that Apple can't differentiate the legitimate data streams. It's actually trivial.
How can you tell any host is "illegal" ? You can only know that after someone had done something bad. It's that simple. That's what I said "passive clean-up". You can only add someone to your blacklist AFTER something goes wrong.
It's also not feasible asking developers to submit all target hosts pre-coded in the App for examination, since code 302 is a "legal" HTTP response designed for redirection. If someone is trying bypass the examination, he can temporarily rent a service at a given domain, and disable the service but leave a redirect instruction after his Apps pass.
From what have been studied by the victim developers, the target host of XcodeGhost is "cloud-analyzer.com", a new domain registered by godaddy.com just 6 months ago, just about the time that XcodeGhost is spread. And the transmitted information is :
* OS version, ex: "8.1.2"
* Device type, ex: "iphone5,2"
* Device IDFA (identifier for advertiser)
* App name,
* App bundle ID,
* App language,
* App version,
* Timestamp
So we now have a new App that will collect only the informations Apple allowed, and it will send these "legal" data to some new domain that has no "criminal record". Now please tell me, HOW can Apple identify whether it's legitimate data transmission or not ? Magic crystal ball ? Time warp ? Or Minority Report ?