Menu

Main Menu
Talk Get Daily Search

Member's Online

    User Name
    Password

    Could what happened in the iTunes Music Store happen to Ovi too?

    Reply
    Page 1 of 2 | 1   2   | Next
    gerbick | # 1 | 2010-07-10, 16:44 | Report

    In case you've not heard, some developers have uploaded some software (mainly books and travel apps) that secure that users details and makes purchases, a lot of purchases.

    More information here...

    Do you think that could happen to Ovi too?

    Edit | Forward | Quote | Quick Reply | Thanks

     
    torpedo48 | # 2 | 2010-07-10, 17:02 | Report

    The most important thing is that it doesn't happen to Maemo.org repositories, expecially Extras.

    Luckily our QA Extras-Testing testers are better than Ovi's.

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Bundyo | # 3 | 2010-07-10, 22:13 | Report

    Well, nothing can be bought from Extras, I don't see many attackers going that way.

    Ovi though can be more attractive to them...

    Edit | Forward | Quote | Quick Reply | Thanks

     
    ysss | # 4 | 2010-07-11, 05:39 | Report

    I'm still not clear on that iTunes attack vector...

    It's not likely that the online store itself is compromised, otherwise the attacker would probably choose a different method to sieve the money.

    Edit | Forward | Quote | Quick Reply | Thanks

     
    gerbick | # 5 | 2010-07-11, 20:18 | Report

    The store wasn't directly compromised. Consider the free books a trojan horse in the truest sense. You get the book, it gathers your info, reports it out - that's dumbed WAY down, but you get the gist.

    Apparently there's a local store of your password, et al that's being exploited. But... could something like that happen in the Ovi Store?

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Bundyo | # 6 | 2010-07-11, 20:24 | Report

    Ovi store unlike iTunes works through MicroB which encrypts the saved passwords (EDIT: maybe just better). However, a keylogger can help in this case...

    Edit | Forward | Quote | Quick Reply | Thanks

    Last edited by Bundyo; 2010-07-12 at 05:56.

     
    gerbick | # 7 | 2010-07-11, 20:29 | Report

    Ah... thanks.

    Edit | Forward | Quote | Quick Reply | Thanks

     
    ysss | # 8 | 2010-07-12, 02:46 | Report

    Isn't it more likely that they use some social engineering trick to harvest the passwords?

    I don't think they even store iTunes password on iOS, because you're asked for the password every time you make a purchase. Well it'll 'cache' it for 5-10 minutes for convenience, but past that period then it'll reask you for the password to be resubmitted over the net for reauthentication.

    Keylogger is also unlikely due to iOS' sandboxing lockdown.

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Bundyo | # 9 | 2010-07-12, 05:57 | Report

    Well, maybe its possible the actual tools are logging in automatically from the victim's iPhone? Then again if it spread so fast maybe it was published somewhere (maybe just not in our part of the internet ).

    Edit | Forward | Quote | Quick Reply | Thanks

     
    ysss | # 10 | 2010-07-12, 07:05 | Report

    That's the thing, unless there's a huge gaping exploitable hole in the iOS, then these apps must've performed some sort of social engineering tricks to gain the users' iTunes Store passwords.

    It's definitely a chink in Apple's armor, just wondering which part:
    - iTunes Store itself (least likely)
    - iOS sandbox (if this is the case, I'm surprised that the damage is limited to 1-2 perpetrator so far... and why there isn't an update yet to address it).
    - iTunes Store' approval system (Maybe the guy hid the social engineering routing somehow ... and this sort of thing is nothing new for Apple )

    Edit | Forward | Quote | Quick Reply | Thanks

    Last edited by ysss; 2010-07-12 at 07:14.

     
    Page 1 of 2 | 1   2   | Next
vBulletin® Version 3.8.8
Normal Logout