iPhone app scam likely fueled by phishing, says security expert

iTunes' permissive downloading rights may have played a part, F-Secure researchers says

It's unlikely that consumers' iTunes accounts were hacked by a Vietnamese iPhone developer, a security researcher said today.

Instead, it's more probable that users' credit cards were obtained through standard phishing tactics or keyloggers that were secretly installed on people's machines, or that iTunes accounts were accessed because of poor password practices.

"Phishing seems the more likely explanation," said Sean Sullivan, a security adviser with Helsinki, Finland-based antivirus vendor F-Secure.

Sullivan was reacting to questions about scenarios that could explain Apple 's claim that approximately 400 iTunes accounts were used to fraudulently purchase software from the iTunes App Store, driving up the popularity of 42 iPhone apps from a single Vietnamese developer, Thuat Nguyen.

Nguyen's apps were yanked from the App Store on Tuesday after Apple accused him of "violating the developer Program License Agreement, including fraudulent purchase patterns."

"Standard phishing attacks," said Sullivan when asked to speculate on the most likely way Nguyen obtained access to the iTunes accounts. "That's much more likely than someone hacking the accounts or Apple's database," he added.

Phishing attacks -- usually launched by massive spam e-mail campaigns that steer users toward a bogus iTunes account page -- are nothing new: The first phishing attack targeting iTunes appeared more than two years ago .

Ironically, the flexibility that iTunes provides customers may have played a part in the scam, Sullivan said. Unlike other online retailers -- Sullivan pointed to Amazon.com as an example -- iTunes doesn't block purchases made from computers using IP addresses in far-flung locations. iTunes users can authorize up to five computers to purchase music, apps or movies from the store.

F-Secure tested iTunes' permissiveness. Mikko Hypponen, the company's chief research officer who is based in Finland, successfully purchased content using the account of a U.S. colleague, with his permission. "An American account gives me access to iTunes from Finland," said Sullivan, who also lives in Helsinki. "Try that on Amazon, and it will say, 'Sorry, you're in Finland, you can't.'"

That flexibility would have allowed Nguyen or others living in Vietnam, China or anywhere else in the world, to illegally access U.S. consumers' iTunes accounts and order his apps. That would also explain the spike that Nguyen's software took on the U.S. App Store's bestseller list, where at one point his programs held more than 40 of the top 50 spots.

How Nguyen obtained the iTunes account credentials may remain a mystery, but Sullivan said they could easily have been harvested by phishing attacks aimed not at iTunes users, but at a much larger pool of victims.

"Another strong possibility is that the [iTunes] passwords were obtained by phishing attacks against Hotmail, Yahoo Mail or Gmail," Sullivan said, citing the three largest free Web e-mail services.

Sullivan based that bet on the fact that a sizable portion of people who go online -- upwards of 20% according to F-Secure's data -- use a single password for all their online activity, including purchasing accounts. In that scenario, once identity thieves obtained the log-in credentials of, say, Hotmail, they would try the same username -- iTunes relies on e-mail addresses for those -- and the same password on Apple's online store.

"If it's true that only 400 accounts were used, it's highly possible that a phishing campaign against Hotmail could have been how these accounts were accessed," said Sullivan. "You could easily find that many [iTunes passwords] in a Hotmail phishing attack."

Nguyen would not have had to collect the Hotmail, Yahoo Mail or Gmail account credentials himself, Sullivan noted: There are plenty of criminal groups eager to sell the information they've harvested.

Consumers can do several things to protect themselves from being victimized by similar scams, Sullivan said. "Parents buy iTunes gift cards for their children to set a spending limit, but using them is an excellent idea for everybody," he said. Users can create an iTunes account without entering a credit card by using a gift card.

"Then, if the account does get phished, or Apple's database is breached, your credit card won't be at risk," Sullivan said.

Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags mobileApplesoftwareapplicationstelecommunicationf-secureMobile and WirelessMacintoshMobile Apps and Services

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.
Gregg Keizer

Gregg Keizer

Computerworld (US)
Show Comments

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?