BlogMasque Attack Abuses iOS’s Code Signing to Spoof Apps and Bypass Privacy Protection | TrendLabs Security Intelligence Blog

blog.trendmicro.com

"First reported in 2014, Masque Attack allowed hackers to replace a genuine app from the App Store with a malformed, enterprise-signed app that had the same Bundle Identifier (Bundle ID). Apple subsequently patched the vulnerabilities (CVE-2015-3772 and CVE-2015-3725), but while it closed a door, scammers seemed to have opened a window. Haima’s repackaged, adware-laden apps and its native helper application prove that App Store scammers are still at it."

Read more...
Linkedin

Want to receive more content like this in your inbox?