How do fraudulent applications make it to the App Store?
Sophos X-Ops researchers believe the scammers successfully bypassed strict App Store security protocols by connecting to a remote website with benign functionality when originally submitting for review; however, once the apps were approved, the scammers redirected apps to an Asian-registered domain
Format
PNG
Quelle:
Sophos Inc.