this post was submitted on 30 Aug 2023
270 points (97.9% liked)

Technology

59235 readers
3425 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Before linking an account, be sure the app you're using is legit.

you are viewing a single comment's thread
view the rest of the comments
[–] Hyzerflip@lemmy.world 4 points 1 year ago (11 children)

Question for the iPhone vs Android crowd. Could this happen in the Apple App Store? Does Apple vet their apps better than Android?

[–] Fingerthief@infosec.pub 4 points 1 year ago (1 children)

I used Apple for the last few years until recently and I can't say I've ever really noticed stuff like apps faking being another app. That's not to say it doesn't happen of course.

I do know the Apple app approval process is definitely more strict than what is required for the Play Store.

I'm not very experienced with Apple or Android development so I'd be curious to hear from devs that use both platforms as well.

[–] ShunkW@lemmy.world 5 points 1 year ago (1 children)

My experience is from years ago, but the vetting process seemed about the same for both when I was working on an app. The initial publish process takes forever. The update process through Apple was much simpler and that used to be a successful attack vector.

Since you rarely get feedback from updates, it's hard to say if Google was as vulnerable, but I've heard that the update scheme is still a thing. Publish a legit app then push malicious updates.

[–] Fingerthief@infosec.pub 1 points 1 year ago (1 children)

Interesting, thanks for the info!

I wasn't aware of the update process being used as an attack vector (if it's still a thing) gonna have to read up more on that.

load more comments (9 replies)