Hacker exposes iOS in-app purchase flaw, circumvents the system with own server
One of the most profitable monetization models recently, in-app purchases, is attracting not only the biggest developers on iOS, but also the attention of a Russian hacker Alexey Borodin who found an easy way to circumvent the system and purchase stuff inside apps without actually paying.
The hack works on all iOS devices running versions from iOS 3.0 to iOS 6.0. While some will be tempted to say that the developer broke Apple’s system, truth is that he simply wrote an alternative store and defends his point by saying that this will only help developers and Apple tighten up their security.
Simply put, to bypass Apple’s servers, Borodin built his own server. In-app purchases are then directed to that server, which in turn delivers a purchase receipt to the device without actually charging users real money. To make this possible, Borodin himself studied hundreds of receipts and spend a few hundred dollars, but finally the system worked.
Going deeper into the technicalities, this method requires a CA certificate and profile for connection with iTunes, and it requires that a user’s Internet connection goes through a Domain Name Server system, set up to intercept requests. With this, you simply need to press the purchase button and the transaction goes through Borodin’s server.
“The security of the App Store is incredibly important to us and the developer community,” Apple rep Natalie Harrison said for The Loop. “We take reports of fraudulent activity very seriously and we are investigating.”
source: i-ekb via TNW, 9to5Mac
The hack works on all iOS devices running versions from iOS 3.0 to iOS 6.0. While some will be tempted to say that the developer broke Apple’s system, truth is that he simply wrote an alternative store and defends his point by saying that this will only help developers and Apple tighten up their security.
Going deeper into the technicalities, this method requires a CA certificate and profile for connection with iTunes, and it requires that a user’s Internet connection goes through a Domain Name Server system, set up to intercept requests. With this, you simply need to press the purchase button and the transaction goes through Borodin’s server.
While this unfolds, Apple has quickly issued a warning its investigating the issue:
“The security of the App Store is incredibly important to us and the developer community,” Apple rep Natalie Harrison said for The Loop. “We take reports of fraudulent activity very seriously and we are investigating.”
source: i-ekb via TNW, 9to5Mac
Things that are NOT allowed: