- Jan 24, 2011
- 9,378
A Chinese third-party iOS app store has infected over 75 million users with adware by repackaging popular apps and redistributing them via its website.
The app store, called Haima, caters the Chinese market only. The service uses a technique called app side-loading to allow users to install apps from outside the official iOS App Store.
Apple supports app side-loading for the enterprise market, where private businesses want their employees to be able to install custom apps not available in the App Store. These apps usually handle sensitive corporate information, and Apple is more than happy to provide the functionality because of its need to be present on the BYOD market.
Haima store relies on stolen digital certificates
Haima operators are using this side-loading process to deliver their apps. The installation process is complicated and relies on custom Apple-issued enterprise certificates.
Users are often tricked into going through this lengthy procedures via aggressive and enticing social media campaigns. On its side, Haima switches around one enterprise certificate every three days. They change certificates on a regular basis because Apple often bans the abused certs.
These certificates are often stolen from legitimate businesses and sold via underground hacking forums. One such certificate costs around $300, a small cost compared to the money Haima store owners are making from their ad-packaged apps.
Read more: Over 75 Million iOS Users Infected with Adware from Third-Party App Store
The app store, called Haima, caters the Chinese market only. The service uses a technique called app side-loading to allow users to install apps from outside the official iOS App Store.
Apple supports app side-loading for the enterprise market, where private businesses want their employees to be able to install custom apps not available in the App Store. These apps usually handle sensitive corporate information, and Apple is more than happy to provide the functionality because of its need to be present on the BYOD market.
Haima store relies on stolen digital certificates
Haima operators are using this side-loading process to deliver their apps. The installation process is complicated and relies on custom Apple-issued enterprise certificates.
Users are often tricked into going through this lengthy procedures via aggressive and enticing social media campaigns. On its side, Haima switches around one enterprise certificate every three days. They change certificates on a regular basis because Apple often bans the abused certs.
These certificates are often stolen from legitimate businesses and sold via underground hacking forums. One such certificate costs around $300, a small cost compared to the money Haima store owners are making from their ad-packaged apps.
Read more: Over 75 Million iOS Users Infected with Adware from Third-Party App Store