Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

12/29/2015
05:00 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Users No Longer Need to Jailbreak Apple iOS To Load Rogue Apps

'DarkSideLoader' app stores can side-load apps and circumvent official app stores on any iOS device.

Security practitioners who've counted on the protection of Apple App Store's walled garden approach now have something new to worry about: rogue app marketplaces are now using stolen enterprise certificates to allow users with even non-jailbroken iPhones and iPads to download applications through unapproved channels. 

Researchers from Proofpoint have dubbed the process used by these types of rogue app stores as "DarkSideLoaders." In their research, they pointed to one marketplace in particular, vShare, as an example of those using DarkSideLoader methods. Advertising one million apps available for iPhones and iPads, including pirated paid apps available for free, vShare in past years has catered to Android and jailbroken iOS devices. However, the game has now changed for this marketplace as it has figured out how to "sideload" applications, or circumvent the Apple App Store or legitimate app stores, into non-jailbroken iOS devices.

Rogue app stores are doing this by signing their apps with Enterprise App distribution certificates issued by Apple.

"These certificates are normally issued to enterprises that want to operate their own internal app stores for employees," the researchers wrote. "A rogue app marketplace using the DarkSideLoader technique has implemented a large scale app re-signing capability. Legitimate games and other apps are decrypted, modified, and re-signed with an enterprise certificate for download by users of the rogue app marketplace."

This capability puts enterprises at risk when their employees start loading applications from these unauthorized app stores.

"These apps can make use of private iOS APIs to access operating system functions that would not be permitted by apps that have been vetted by Apple for publishing on the official app store," Proofpoint researchers said.

The biggest risk to enterprises, of course, is that these unauthorized apps are used as vehicles to carry known or zero-day vulnerabilities that will allow the app maker to compromise the device. Security experts have long warned about the dangers of jailbreaking devices in order to sideload devices due to the high prevalence of malicious mobile devices lurking in these types of marketplaces. Attackers load attractive applications--such as pirated popular games or productivity applications--with remote access trojans (RATs) that can be used to infiltrate corporate networks when infected devices connect to them.

"The vShare marketplace is noteworthy in that it is accessible to iOS devices connecting from anywhere in the world, representing a global expansion of this attack technique," wrote the researchers. "This technique also makes it possible to load onto the iOS devices configuration profiles that would allow an attacker to configure VPN settings to redirect network traffic to their man-in-the-middle nodes, as well as change various OS settings."

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
12/30/2015 | 10:33:18 AM
Vetting Process?
How are these enterprise certificates provided? I would imagine by Apple but is there a stringent vetting process in place to provide these certs to an enterprise? This article would make me believe there is not.
melgross
50%
50%
melgross,
User Rank: Apprentice
12/30/2015 | 10:51:08 AM
Re: Vetting Process?
I just hope that when people using these, and other unapproved stores, get malware, they blame themselves, rather than Apple. There is a very good reason why iOS is so secure from malware, as opposed to Android. That is, other than the poor way that Android itself was written.
WCLoehr
50%
50%
WCLoehr,
User Rank: Strategist
12/30/2015 | 6:21:42 PM
Re: Vetting Process?
Let's say your company is Acme, Inc. and you develop apps. you apply to Apple for an enterpise cert so your Acme employees can use it for installing "enterprise approved" apps. What then prevents you from using that for others? Outside of the agreement you accepted when getting the cert from Apple...nothing. There probably is little monitoring of how pwoplw are using these certs once they get them, see no eveil, hear no eveil, perhaps? At this point, its hard to say whether Apple should be doing more, but my bet would be they have a process deficiency that needs to be solved now.
ZucchiniW940
50%
50%
ZucchiniW940,
User Rank: Apprentice
1/6/2016 | 3:28:57 AM
Re: Vetting Process?
The people operating these marketplaces are criminals.  They have elaborate schemes to pay people to impersonate companies and fraudulently obtain enterprise distributions certificates.  Our research shows that companies in China and the United Arab Emirates have been faked, and those identities used to get around Apple's vetting process.  

 

Dave

Proofpoint

 
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
US Counterintelligence Director & Fmr. Europol Leader Talk Election Security
Kelly Sheridan, Staff Editor, Dark Reading,  10/16/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4564
PUBLISHED: 2020-10-20
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.3.1 and IBM Sterling File Gateway 2.2.0.0 through 6.0.3.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially lea...
CVE-2020-4748
PUBLISHED: 2020-10-20
IBM Spectrum Scale 5.0.0 through 5.0.5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 188517.
CVE-2020-4749
PUBLISHED: 2020-10-20
IBM Spectrum Scale 5.0.0 through 5.0.5.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link ...
CVE-2020-4755
PUBLISHED: 2020-10-20
IBM Spectrum Scale 5.0.0 through 5.0.5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 188595.
CVE-2020-4756
PUBLISHED: 2020-10-20
IBM Spectrum Scale V4.2.0.0 through V4.2.3.23 and V5.0.0.0 through V5.0.5.2 as well as IBM Elastic Storage System 6.0.0 through 6.0.1.0 could allow a local attacker to invoke a subset of ioctls on the device with invalid arguments that could crash the keneral and cause a denial of service. IBM X-For...