Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

MacRumors

macrumors bot
Original poster
Apr 12, 2001
68,712
39,640



NewImage1.png
Researchers from Georgia Tech submitted to the App Store and received approval for a malicious app, according to Technology Review. The researchers submitted an innocuous app that included inactive malware-type code hidden from Apple's app approval system.

When downloaded onto a test device after the app was approved, the app 'phoned home' and gained a variety of abilities that compromised the host phone.
This malware, which the researchers dubbed Jekyll, could stealthily post tweets, send e-mails and texts, steal personal information and device ID numbers, take photos, and attack other apps. It even provided a way to magnify its effects, because it could direct Safari, Apple's default browser, to a website with more malware.
The researchers, including Long Lu, a Stony Brook University researcher who was part of the team at Georgia Tech, only put the app on the App Store very briefly and it was not downloaded by anyone other than research team members.

The team said that using monitoring code built into the app, they determined that Apple's app approval team only ran the app for a few seconds and that malicious code was not discovered by Apple's team. "The message we want to deliver is that right now, the Apple review process is mostly doing a static analysis of the app, which we say is not sufficient because dynamically generated logic cannot be very easily seen," said Lu.

Apple spokesman Tom Neumayr told Technology Review that the company made some changes to the iOS operating system in response to the paper, though he did not specify what the changes were.

Article Link: Researchers Show How Apple's App Approval Process Can Be Beaten by Malicious Apps
 
Fortunately with Apple's system - if something malicious is discovered it can be quickly pulled before harming anyone else.

Try getting the word out about a bad program and having it's website pulled. Much tougher as proven by all the spyware windows applications available.
 
Brace yourself. This Thread is about to turn into such a heated debate not even the Marshmallows will survive. :cool:
 
Fortunately with Apple's system - if something malicious is discovered it can be quickly pulled before harming anyone else.

Perhaps I'm misunderstanding the post above, but my reading of the News story indicated that Apple's approval process DIDN"T catch the malware embedded in the app, which was downloaded...if only by the researchers. It's my impression that the research points out weaknesses in the approval process which could allow malware to be downloaded by consumers before Apple catches it.

The research is valuable, IMO, in pointing out problems which Apple can now address.
 
They only reviewed it for a few seconds? wow.
The fact that it grabbed so much information is scary.
 
So a human (or even non-human) process can have flaws?! A study was needed to realize or "prove" that? Really?
 
Fortunately with Apple's system - if something malicious is discovered it can be quickly pulled before harming anyone else.

Try getting the word out about a bad program and having it's website pulled. Much tougher as proven by all the spyware windows applications available.

Too bad this malicious malware wasn't discovered.
 
We are lucky there are people out there who spend time doing this only to strengthen security in the system. I highly support hacking for the benefit of others.
 
Sorry, I thought this was already public knowledge. Any app developer can embed malicious code, then have it 'turn on' at a specific time. There is no code check, Apple only launch the app - they never get a copy of the source code of each app so have no way of knowing what's inside of it.

The only way this will ever change is if the compilation of the apps is done on Apple servers.
 
Fortunately with Apple's system - if something malicious is discovered it can be quickly pulled before harming anyone else.

Try getting the word out about a bad program and having it's website pulled. Much tougher as proven by all the spyware windows applications available.

There exists an app kill switch. It just hasn't been used as of yet.
 
Question is, how many people discovered and implemented it before it was found by this research.
 
Question is, how many people discovered and implemented it before it was found by this research.

And what changes to iOS specifically could prevent timer-based malicious code? This seems to be a problem with the review process rather than the OS.
 
Last edited:
I've come to a conclusion that all these analysts / researchers lack any thrill in their lives ..all they want to see is apple or any other company fail ..
 
Last edited by a moderator:
I've come to a conclusion that all these analysts / researchers lack any thrill in their lives ..all they want to see is apple or any other company fail ..

I don't understand how pointing out a flaw that can be fixed represents a desire to see Apple fail.:confused:
 
Last edited by a moderator:
get right on that apple

Oh wait. Then developers start complaining about approval times. Either way its going to cost somebody something.
 
I thought Timmy C. approved all apps personally!?!? :eek:

I've come to a conclusion that all these analysts / researchers lack any thrill in their lives ..all they want to see is apple or any other company fail ..
Well, I for one am quite happy with people finding chinks in the armor of one of the most powerful companies in the universe. Keeps 'em honest.
 
Last edited by a moderator:
The post sounds a bit like schadenfreude...;)
Holy crap. I had to 3-finger that word. :eek: I'd even use it if I could pronounce it.

Ack, No. I don't want to see Apple fail - just challenged every step of the way lest they meander down the wrong path and forget who put 'em where they are. :)
 
I like Apple's screening process for keeping out SOME of the bad guys.

I like it better for removing them after approval, once caught, and for having a paper trail pointing back to the criminal. Thus making it less worth their while.

I also like the OS design (better with each version) that limits what even CAN be done. Which needs to continue getting tighter, clearly.

I like these researchers, too! As long as they reported the issue to Apple privately long before dangling a treat in front of criminals. (That's good security practice, and if they didn't do it, and opted for attention instead, I don't like them so much... but I'll still take the benefit of their findings.)

Apple can never screen out and block everything anyone might try, but they've succeeded in making a safe, trusted platform that Android users can only dream of. AND it needs to improve--which can't happen without catching the loopholes.
 
Last edited:
Holy crap. I had to 3-finger that word. :eek: I'd even use it if I could pronounce it.

Ack, No. I don't want to see Apple fail - just challenged every step of the way lest they meander down the wrong path and forget who put 'em where they are. :)

Listen, consider yourself lucky I didn't go all sesquipedalian on you!:p ;)
 
Holy crap. I had to 3-finger that word. :eek: I'd even use it if I could pronounce it.

Ack, No. I don't want to see Apple fail - just challenged every step of the way lest they meander down the wrong path and forget who put 'em where they are. :)

Holy Crap. I had to try the 3-finger thing. I did not OS X did that! Oh, and cool word :D
 
Fortunately with Apple's system - if something malicious is discovered it can be quickly pulled before harming anyone else.

Try getting the word out about a bad program and having it's website pulled. Much tougher as proven by all the spyware windows applications available.

This method seems to be rather easily defeated- all you need is to wait for 3 or 6 months between purchase and malicious activity; and you're assuming that the malicious activity is going to be obvious to the end user- not necessarily the case...
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.