Malware: How this software is being used to target Apple users with malware – Times of India

Apple test flight Software pre-release testing system being used by CryptoROM scammers to send malicious apps iPhone According to a report by Sophos users. The scam first surfaced last year, in which CryptoROM attacks were used to steal approximately $1.4 million from Apple the user. The scammers then used social media platforms, dating apps, Apple’s Enterprise Developer Program and . used a combination of cryptocurrency To target people. According to the report, the scam has now developed and is abusing Apple’s TestFlight platform that allows users to test. Beta The version of the app before going to the App Store.
Since beta apps for testing purposes aren’t under strict monitoring – they’re not being screened for the App Store – this leaves a chance for fraudsters to send malware Directly on the victim’s device via the beta app version. According to the report, victims are instructed to install TestFlight and click on a link, which installs the malicious app on their device. Average apple user Thinks the platform they’re using is one of the most secure in the world, oblivious to the possibility that a beta version of an app meant for the App Store could come with a threat.
“Apple supports the use of TestFlight app distribution in two ways: for small internal application tests sent by email invitation to up to 100 users, and for larger public beta tests supporting up to 10,000 users. App Store security review is not required for this application, whereas TestFlight apps shared by public web links require an initial review of the code build by the App Store”, the report said.
According to the report, victims of the scam were redirected to fake versions of various cryptocurrency sites. It states that a legitimate cryptocurrency exchange will not ask a user to install TestFlight in order to use its app. If someone asks them to install or a website does, it is a sign of fraudulent behavior. The report also advised users against setting up device management profiles, unless specifically required by their place of employment or higher educational institution.