iPhone app scam likely fueled by phishing, says security expert
iTunes' permissive downloading rights may have played a part, F-Secure researcher says
Computerworld - It's unlikely that consumers' iTunes accounts were hacked by a Vietnamese iPhone developer, a security researcher said today.
Instead, it's more probable that users' credit card numbers were obtained through standard phishing tactics or via keyloggers that were secretly installed on people's machines, or that iTunes accounts were accessed because of poor password practices.
"Phishing seems the more likely explanation," said Sean Sullivan, a security adviser at Helsinki, Finland-based antivirus vendor F-Secure.
Sullivan was reacting to questions about scenarios that could explain Apple Inc.'s claim that approximately 400 iTunes accounts were used to fraudulently purchase software from the iTunes App Store, driving up the popularity of 42 iPhone apps from a single Vietnamese developer, Thuat Nguyen.
Nguyen's apps were yanked from the App Store on Tuesday after Apple accused him of "violating the developer Program License Agreement, including fraudulent purchase patterns."
"Standard phishing attacks," said Sullivan when asked to speculate on the most likely way Nguyen obtained access to the iTunes accounts. "That's much more likely than someone hacking the accounts or Apple's database," he added.
Phishing attacks -- usually launched by massive spam e-mail campaigns that steer users toward a bogus iTunes account page -- are nothing new: The first phishing attack targeting iTunes appeared more than two years ago.
Ironically, the flexibility that iTunes provides customers may have played a part in the scam, Sullivan said. Unlike other online retailers -- Sullivan pointed to Amazon.com as an example -- iTunes doesn't block purchases made from computers using IP addresses in far-flung locations. Users of iTunes can authorize up to five computers to purchase music, apps or movies from the store.
F-Secure tested iTunes' permissiveness. Mikko Hypponen, the company's chief research officer who is based in Finland, successfully purchased content using the account of a U.S. colleague, with his permission. "An American account gives me access to iTunes from Finland," said Sullivan, who also lives in Helsinki. "Try that on Amazon, and it will say, 'Sorry, you're in Finland, you can't.'"
That flexibility would have allowed Nguyen or others living in Vietnam, China or anywhere else in the world, to illegally access U.S. consumers' iTunes accounts and order his apps. That would also explain the spike that Nguyen's software took on the U.S. App Store's bestseller list, where at one point his programs held more than 40 of the top 50 spots.
How Nguyen obtained the iTunes account credentials may remain a mystery, but Sullivan said they could easily have been harvested by phishing attacks aimed not at iTunes users, but at a much larger pool of victims.
"Another strong possibility is that the [iTunes] passwords were obtained by phishing attacks against Hotmail, Yahoo Mail or Gmail," Sullivan said, citing the three largest free Web e-mail services.
Sullivan based that bet on the fact that a sizable portion of people who go online -- upwards of 20% according to F-Secure's data -- use a single password for all of their online activity, including their shopping accounts. In that scenario, once identity thieves obtained the log-in credentials of, say, Hotmail, they would try the same username -- iTunes relies on e-mail addresses for those -- and the same password on Apple's online store.
"If it's true that only 400 accounts were used, it's highly possible that a phishing campaign against Hotmail could have been how these accounts were accessed," said Sullivan. "You could easily find that many [iTunes passwords] in a Hotmail phishing attack."
Nguyen would not have had to collect the Hotmail, Yahoo Mail or Gmail account credentials himself, Sullivan noted: There are plenty of criminal groups eager to sell the information they've harvested.
Consumers can do several things to protect themselves from being victimized by similar scams, Sullivan said. "Parents buy iTunes gift cards for their children to set a spending limit, but using them is an excellent idea for everybody," he said. People who use gift cards can create an iTunes account without entering a credit card number.
"Then, if the account does get phished, or Apple's database is breached, your credit card won't be at risk," Sullivan said.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, or subscribe to Gregg's RSS feed . His e-mail address is firstname.lastname@example.org.
Read more about Macintosh in Computerworld's Macintosh Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Accelerating Network Convergence in Virtualized and Cloud Data Centers Adopting a converged networking strategy enables organizations to traffic server and storage I/O workloads on consolidated data throughput channels. Intelligent software helps optimize...
- Omnichannel: From Buzzword to Strategy Customers demand a seamless experience across channels, especially mobile. Read this whitepaper for a research-based framework for using omnichannel for higher customer engagement.
- How 10GbE Network is the Backbone of the Virtual Data Center The shift to a virtual data center has put tremendous strain on legacy networks; driving the need for more speed, lower latency, more...
- 10GbE in the Data Center Improvements in 10GbE technology, lower pricing, and improved performance make 10GbE for the mid-market a viable and cost-effective strategy. This white paper discusses...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Macintosh White Papers | Webcasts