Hacker exposes iOS in-app purchase flaw, circumvents the system with own server

9comments
Hacker exposes iOS in-app purchase flaw, circumvents the system with own server
One of the most profitable monetization models recently, in-app purchases, is attracting not only the biggest developers on iOS, but also the attention of a Russian hacker Alexey Borodin who found an easy way to circumvent the system and purchase stuff inside apps without actually paying.

The hack works on all iOS devices running versions from iOS 3.0 to iOS 6.0. While some will be tempted to say that the developer broke Apple’s system, truth is that he simply wrote an alternative store and defends his point by saying that this will only help developers and Apple tighten up their security.

Simply put, to bypass Apple’s servers, Borodin built his own server. In-app purchases are then directed to that server, which in turn delivers a purchase receipt to the device without actually charging users real money. To make this possible, Borodin himself studied hundreds of receipts and spend a few hundred dollars, but finally the system worked.

Going deeper into the technicalities, this method requires a CA certificate and profile for connection with iTunes, and it requires that a user’s Internet connection goes through a Domain Name Server system, set up to intercept requests. With this, you simply need to press the purchase button and the transaction goes through Borodin’s server.

While this unfolds, Apple has quickly issued a warning its investigating the issue:



source: i-ekb via TNW, 9to5Mac

Create a free account and join our vibrant community
Register to enjoy the full PhoneArena experience. Here’s what you get with your PhoneArena account:
  • Access members-only articles
  • Join community discussions
  • Share your own device reviews
  • Build your personal phone library
Register For Free

Recommended Stories

Loading Comments...
FCC OKs Cingular\'s purchase of AT&T Wireless