iPhone app scam likely fueled by phishing, says security expert

iTunes' permissive downloading rights may have played a part, F-Secure researchers says

It's unlikely that consumers' iTunes accounts were hacked by a Vietnamese iPhone developer, a security researcher said today.

Instead, it's more probable that users' credit cards were obtained through standard phishing tactics or keyloggers that were secretly installed on people's machines, or that iTunes accounts were accessed because of poor password practices.

"Phishing seems the more likely explanation," said Sean Sullivan, a security adviser with Helsinki, Finland-based antivirus vendor F-Secure.

Sullivan was reacting to questions about scenarios that could explain Apple 's claim that approximately 400 iTunes accounts were used to fraudulently purchase software from the iTunes App Store, driving up the popularity of 42 iPhone apps from a single Vietnamese developer, Thuat Nguyen.

Nguyen's apps were yanked from the App Store on Tuesday after Apple accused him of "violating the developer Program License Agreement, including fraudulent purchase patterns."

"Standard phishing attacks," said Sullivan when asked to speculate on the most likely way Nguyen obtained access to the iTunes accounts. "That's much more likely than someone hacking the accounts or Apple's database," he added.

Phishing attacks -- usually launched by massive spam e-mail campaigns that steer users toward a bogus iTunes account page -- are nothing new: The first phishing attack targeting iTunes appeared more than two years ago .

Ironically, the flexibility that iTunes provides customers may have played a part in the scam, Sullivan said. Unlike other online retailers -- Sullivan pointed to Amazon.com as an example -- iTunes doesn't block purchases made from computers using IP addresses in far-flung locations. iTunes users can authorize up to five computers to purchase music, apps or movies from the store.

F-Secure tested iTunes' permissiveness. Mikko Hypponen, the company's chief research officer who is based in Finland, successfully purchased content using the account of a U.S. colleague, with his permission. "An American account gives me access to iTunes from Finland," said Sullivan, who also lives in Helsinki. "Try that on Amazon, and it will say, 'Sorry, you're in Finland, you can't.'"

That flexibility would have allowed Nguyen or others living in Vietnam, China or anywhere else in the world, to illegally access U.S. consumers' iTunes accounts and order his apps. That would also explain the spike that Nguyen's software took on the U.S. App Store's bestseller list, where at one point his programs held more than 40 of the top 50 spots.

How Nguyen obtained the iTunes account credentials may remain a mystery, but Sullivan said they could easily have been harvested by phishing attacks aimed not at iTunes users, but at a much larger pool of victims.

"Another strong possibility is that the [iTunes] passwords were obtained by phishing attacks against Hotmail, Yahoo Mail or Gmail," Sullivan said, citing the three largest free Web e-mail services.

Sullivan based that bet on the fact that a sizable portion of people who go online -- upwards of 20% according to F-Secure's data -- use a single password for all their online activity, including purchasing accounts. In that scenario, once identity thieves obtained the log-in credentials of, say, Hotmail, they would try the same username -- iTunes relies on e-mail addresses for those -- and the same password on Apple's online store.

"If it's true that only 400 accounts were used, it's highly possible that a phishing campaign against Hotmail could have been how these accounts were accessed," said Sullivan. "You could easily find that many [iTunes passwords] in a Hotmail phishing attack."

Nguyen would not have had to collect the Hotmail, Yahoo Mail or Gmail account credentials himself, Sullivan noted: There are plenty of criminal groups eager to sell the information they've harvested.

Consumers can do several things to protect themselves from being victimized by similar scams, Sullivan said. "Parents buy iTunes gift cards for their children to set a spending limit, but using them is an excellent idea for everybody," he said. Users can create an iTunes account without entering a credit card by using a gift card.

"Then, if the account does get phished, or Apple's database is breached, your credit card won't be at risk," Sullivan said.

Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags telecommunicationapplicationsMobile and WirelessMobile Apps and ServicessecurityMacintoshf-securesoftwaremobileApple

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Gregg Keizer

Computerworld (US)
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?