Security Alerts & News
by Tymoteusz A. Góral

History
#1452 How a third-party App Store abuses Apple’s developer enterprise program to serve adware
For bogus applications to be profitable, they should be able to entice users into installing them. Scammers do so by riding on the popularity of existing applications, embedding them with unwanted content—even malicious payloads—and masquerading them as legitimate. These repackaged apps are peddled to unsuspecting users, mostly through third-party app stores.

Haima exactly does that, and more. We discovered this China-based third-party iOS app store aggressively promoting their repackaged apps in social network channels—YouTube, Facebook, Google+, and Twitter—banking on the popularity of games and apps such as Minecraft, Terraria, and Instagram to lure users into downloading them.

Third-party app stores such as Haima rely on the trust misplaced not only by the users but also by distribution platforms such as Apple’s, whose Developer Enterprise Program is abused to deploy these repackaged apps. These marketplaces also appeal to the malefactors because they are typically less policed. Haima capitalizes on the monetization of ads that it unscrupulously pushes to its repackaged apps.
Read more
#1456 Secret Service warns of ‘Periscope’ skimmers
#1455 Adblock Plus finds the end-game of its business model: Selling ads
#1454 Generic OSX malware detection method explained
#1453 Gugi: from an SMS trojan to a mobile-banking trojan
#1452 How a third-party App Store abuses Apple’s developer enterprise program to serve adware
#1451 Hands-on: Blue Hydra can expose the all-too-unhidden world of Bluetooth
#1450 Allow web domain changeover: US tech firms
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12