contador javascript Skip to content
Contact : alejandrasalcedo0288@gmail.com

Apple removes 17 malicious apps from the App Store

Malware "width =" 900 "height =" 477 "class =" alignnone size-full wp-image-268950 "srcset =" https://www.funzen.net/wp-content/uploads/2019/10/Apple-removes-17-malicious-apps-from-the-App-Store.jpg 900w, https: / /t.ipadizate.es/2019/01/Malware-320x170.jpg 320w, https://t.ipadizate.es/2019/01/Malware-768x407.jpg 768w, https://t.ipadizate.es/2019 /01/Malware-640x339.jpg 640w, https://t.ipadizate.es/2019/01/Malware-792x420.jpg 792w, https://t.ipadizate.es/2019/01/Malware-300x160.jpg 300w, https://t.ipadizate.es/2019/01/Malware-681x361.jpg 681w "sizes =" (max-width: 900px) 100vw, 900px "/><br />
A group of 17 iPhone applications were detected and removed from the App Store. After checking that <strong>They commit fraud in secret in the background.</strong> They belong to the same developer, AppAspect Technologies, and were hidden behind the facade of a restaurant search engine, Internet radio, BMI calculator, video compressor and GPS speedometer.</p>
<p>The fraud detection work was carried out by the mobile security company Wandera, verifying that the malicious apps contained the <strong>trojan clicker module</strong>. As stated, 9to5mac, this module is designed to perform tasks related to advertising fraud, such as continuously opening web pages or clicking on links without user interaction.</p>
<p><img src=

Ace, the clicker trojan generate income on web pages with fake traffic and in the worst case, it is used to consume the advertising budget of the competition, by covering the cost per click of them, without generating any type of conversion.

We recommend you | Apple clarifies the privacy policy of Safari

The work done by Wandera, determined that for some time these malicious apps from the App Store, they evaded Apple’s review process because the malicious code was not inside the application itself. Otherwise, it worked by receiving instructions from the Command & Control server that allows defective apps to bypass security checks, by activating a communication channel directly with the attacker that is not visible to Apple.

For iPhone users, the activity of these applications accelerated the consumption of mobile data, slowed down the device and accelerated the depletion of the battery.

This recent discovery has ignited the alerts of the company of the bitten apple. From Apple have manifested ensuring that you are improving your application review process, to detect this approach and avoid important damage to the users of the App Store.