Google yanks sketchy iMessage clone for Android from app store
People who probed the app's innards suspected it was harvesting Apple ID credentials
Computerworld - An app that purportedly spoofed a Mac so that Android smartphone and tablet owners could send and receive text-like messages through Apple's iMessage service disappeared today from the Google Play app store.
Google confirmed that it yanked the app for violating its store policies.
Dubbed "iMessage Chat," the app came under quick fire Monday from other app developers who said the program may have been harvesting Apple ID usernames and passwords by passing packets through a China-based server.
The app first appeared on Google Play on Sept. 12 and was available as late as Monday. By today, however, it had been scrubbed from the app store.
iMessage is Apple's proprietary technology that is embedded in the Message apps for iOS 5 and later and OS X Mountain Lion. When users text another iOS device or a Mac, they sidestep their mobile carrier's traditional SMS (short message service), avoiding texting charges.
The Android app was designed to let users piggyback on Apple's iMessage service to send and receive texts.
But concerns about the implications quickly surfaced.
"iMessage for Android app has code to download APKs in the background? TOTALLY SAFE. Not rootkit-ing your phone or anything? :D," tweeted Steve Troughton-Smith, an app developer with High Caffeine Content, on Monday.
The term "APK" in Troughton-Smith's tweet referred to the file format used by Android to install apps and other code on the operating system.
Others pointed out that users of the app were required to log in using their Apple ID username and password, and that the developer may have simply built the program to collect those valuable credentials, which are used to access iOS devices remotely for data wiping, purchasing content on iTunes and buying goods, including iPhones and Macs, through Apple's online store.
Jay Freeman, who goes by the online nickname "saurik," dug inside the app and tracked the packets it sent and received. Freeman is best known as the developer of Cydia, the open-source application installer that acts as an App Store substitute for jailbroken iPhones.
He found that iMessage Chat for Android essentially inserted itself into the middle of the normal back-and-forth between a user and Apple's iMessage servers. In a thread on Hacker News, Freeman spelled out his findings.
"I believe that this application actually does connect to Apple's servers from the phone, but it doesn't then interpret the protocol on the device," Freeman wrote on the thread. "Instead, it ferries the data to the third-party developer's server, parses everything remotely, figures out what to do with the data, and sends everything back to the client decoded along with responses to send back to Apple."
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Cybercrime and Hacking White Papers | Webcasts