Pages: [1]   Go Down
  Print  
Author Topic: Hacker Releases Tools for Bypassing Apple's In App Purchase Mechanism [Updated]  (Read 395 times)
HCK
Global Moderator
Hero Member
*****
Posts: 79425



« on: July 13, 2012, 07:00:32 pm »

Hacker Releases Tools for Bypassing Apple's In App Purchase Mechanism [Updated]
      



      As noted by 9to5Mac, a Russian hacker has developed a relatively simple method to allow users to bypass Apple's In App Purchase mechanism on many iOS apps, allowing users to obtain the content for free.





Alternate In App Purchase confirmation button seen on hacked devices

The method, which does not require jailbreaking, involves installing a pair of certificates on the user's device and then using a custom DNS entry.  Users can then perform in-app purchases as usual and automatically be redirected through the hacked system.





Aside from the obvious impact that the hack involves theft of content from developers, the method also poses risks to those using the hack, as some of their own information is transmitted to the hacker's servers during the purchasing process.  For both of those reasons, users are strongly advised not to pursue the method.



The hacker has already been evicted from his original host and had reportedly moved to a new one, but the site is currently down.  It is unclear whether it is down simply due to high traffic or if other steps are being taken to hinder his activities.



Developers can prevent the hack from working with their apps by implementing validation of In App Purchase receipts, something many developers have not included in their apps.



Update: The Next Web takes a closer look at the method developed by Alexey Borodin, which actually can not be prevented simply by employing receipt validation.It is simply a method for bypassing Apple’s authentication servers for in-app purchases, directing the requests to Borodin’s service, which then delivers a receipt back to the device that fools the app into thinking that it has ‘purchased’ the content. This is commonly referred to as a man-in-the-middle attack.



All Borodin’s service needs is a single donated receipt, which it can then use to authenticate anyone’s purchase requests. Many of those receipts have been donated by Borodin himself, who has spent several hundred dollars on in-app purchases testing and generating receipts. [...]



Because the bypass emulates the receipt verification server on the App Store, the app treats it as an official communication, period.Addressing the issue will ultimately require changes by Apple, which could enhance the API used for In App Purchases to provide for uniquely signed receipts that could not be duplicated on a mass basis as with Borodin's service.



The Next Web also interviewed Borodin, who noted that he has turned over operation of the site to a third party in order to avoid trouble and will be deleting any information he obtained from running the operation.  According to Borodin, over 30,000 in-app transactions were made through his service, and he netted just $6.78 in PayPal donations to help with his costs.


Recent Mac and iOS Blog Stories
• Apple Updates iPhoto to Version 9.3.1 With Minor Bug Fixes
• Apple Store SoHo Reopens Saturday July 14th After Extensive Expansion
• NBC Releases Summer Olympics iOS Apps, Offering Livestreaming of All 302 Events
• 'iPad Mini' Cases Accompanied by Sketchy Drawings
• News Corp. Considering Canceling 'The Daily'?


 

      

http://www.macrumors.com/2012/07/13/hacker-releases-tools-for-bypassing-apples-in-app-purchase-mechanism/
      
Logged
Pages: [1]   Go Up
  Print  
 
Jump to: