Feeds

Apple fails to block stolen iOS in-app content

Donations keep cheeky Russian hacker's servers alive

The Power of One eBook: Top reasons to choose HP BladeSystem

Apple has moved to shut down a hack that allows users of iOS devices to download in-app content without paying for it – but the service is still operating and its creator remains defiant.

The exploit relies in part on a custom DNS server that intercepts incoming purchase requests from iOS devices. Over the weekend, Apple blocked that server's IP address, preventing it from connecting to the legitimate App Store, and issued a takedown request to its ISP, TheNextWeb reports.

Apple has also asserted a copyright claim against the instructional video explaining the hack, which has since been removed from YouTube.

It is estimated that the In-Appstore.com service has already been used to download in-app content more than 30,000 times.

The man behind the hack, who goes by the handle ZonD80, has been identified as Russian programmer Alexey V. Borodin.

Despite Cupertino's best efforts, Borodin continues to host the in-app purchasing exploit at In-Appstore.com. A DNS lookup of that domain suggests it may currently be operating from a server located in Panama.

Although Apple has recently released iOS 6 beta 3 to developers, Borodin says that patch does nothing to block his exploit.

The cheeky Russian has actually gone as far as to publish terms of service for his hack, which state that the service comes with no warranty and that he won't be held responsible for any damages.

Nonetheless, the server is not collecting any user information, Borodin says. Although users may be asked for their App Store password when connecting to the server, he advises them to enter a random one. "This is a real appstore do [sic]," he writes.

Furthermore, Borodin insists that the hack costs users nothing and it will always be free, and he asks that merchants not contact him about profit-sharing opportunities. He is still fishing for donations, however.

Traffic to the service has been heavy, Borodin says, and his virtualized server has buckled under the load. He'd like to raise some cash to buy a dedicated machine with more bandwidth.

That may be wishful thinking, however. On Sunday, Borodin was again pleading for donations. "Tomorrow service will be shut down," he wrote, "if I cannot find $50 for bill for hosting for next month (it's already unpaid for two days)."

That request may have been granted, but gathering donations hasn't been easy for Borodin. On Friday, PayPal suspended his account for violations of its acceptable use policy, meaning he won't be able to access those funds for 180 days. Borodin is now accepting funds via the BitCoin digital currency.

He'll accept another kind of donation, too. "Apple, please contact me," he writes. "I want to share my experience with you, if you give me one iPhone 5 for free!"

Apple did not immediately respond for requests for comment, but it seems unlikely that providing a free iPhone is what it has in mind. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.