Pirated mobile Android and Apple apps are getting hacked, cracked and smacked
Network World - Those popular mobile apps that everyone's buying from the official Android and Apple apps stores for business and fun are being torn apart by hackers who turn around and post these abused apps filled with malware, their content pirated or otherwise tampered, according to a study out today.
Security vendor Arxan, which makes tools for hardening applications from tampering, says it wants to make this point about apps abuse with its study that describes how it found that 92% of the top 100 paid apps being sold in the Apple App Store had been hacked in various ways, and so had a full 100% of the top 100 apps originally found in Google Play.
"As a hacker, you can take the official application and make it free, and have hidden malware -- the original app owner doesn't know," says Jukka Alanen, vice president of business development at Arxan Technologies and author of the study, "Mobile Apps under Attack."
Beyond its look to find pirated and malware-laden versions of paid apps, Arxan also says it found that 40% of the top 15 free Apple iOS apps and 80% of the top 15 free Android apps (based on May 2012) were found to be hacked in a similar way.
The hacked apps that Arxan discovered included not just knock-offs of the popular Angry Birds app, but also an app for voice translation, games like Flick Homerun and tools such as Beautiful Widgets from LevelUpStudio.
Alanen says Arxan's research on legit apps that had been pirated and tampered with in some way was done by scouring online resources to find them. For instance, to look for Apple iOS apps, Arxan hunted through the Cydia service which has Cydia software for download that acts as a channel to find both free and paid apps for jailbroken Apple iOS devices.
As a kind of unsanctioned Apple app store, "it's a channel to find these sources," Alanen says. Arxen's hunt for knock-offs of legitimate apps also involved looking around for pirated Android apps, scouring places like iCracker and torrent-based sites. Alanen says there's a problem out there with intellectual property and decompiled apps source code being reused without the owner's permission to create new apps as well, such as versions of games without ads, for instance.
It's all not that hard to do, he asserts. Hackers can "reverse engineer the app" using tools that are freely available online, then tamper with the code, adding features and capabilities, such as video uploads, additional device or operating system support. The hacker can even take stolen code and end up re-publishing it in a different guise to the Apple App Store. Apple does have a process to look for malware, but may not necessarily be sharp in catching pirated code, Alanen says.
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts