If you’ve used an iOS device, you’ve almost certainly encountered a popup asking you to enter your Apple ID password. It often appears within the App Store and iTunes Store, but it also has a tendency to randomly popup from time to time due to something running in the background.
A new blog post from developer Felix Krause, however, explains how that popup could be used to easily trick someone into handing over their Apple ID and password.
The developer explains it is incredibly easy for an iOS app maker to recreate the Apple ID password prompt. From there, the app could send that popup and subsequently log the Apple ID and password. He also noted that the popup takes less than 30 lines of code and could seemingly be dropped in any legitimate iOS app and sneak past App Store review teams.
“Showing a dialog that looks just like a system popup is super easy, there is no magic or secret code involved, it’s literally the examples provided in the Apple docs, with a custom text,” said Krause in his blog post. “I decided not to open source the actual popup code, however, note that it’s less than 30 lines of code and every iOS engineer will be able to quickly build their own phishing code.”
Krause notes how this has been a big problem on desktop browsers for years, with illegitimate websites sending fake popups that are nearly identical to normal system notifications. It’s largely the same for iOS as well. He says he’s already filed this issue as a radar with Apple and explains that it could be fixed by Apple not allowing passwords to be entered in popups, but rather only in the Settings app/App Store.
As for how you can protect yourself, Krause outlines the following steps:
- Hit the home button, and see if the app quits:
- If it closes the app, and with it the dialog, then this was a phishing attack
- If the dialog and the app are still visible, then it’s a system dialog. The reason for that is that the system dialogs run on a different process, and not as part of any iOS app.
- Don’t enter your credentials into a popup, instead, dismiss it, and open the Settings app manually. This is the same concept, like you should never click on links on emails, but instead open the website manually
- If you hit the Cancel button on a dialog, the app still gets access to the content of the password field. Even after entering the first characters, the app probably already has your password.
You can read Krause’s full explanation of this phishing method on his blog.
FINALLY, here’s the video that I promised all of you! Since Instagram is my favourite distribution channel, I am releasing this opportunity here FIRST before I share it on Facebook, Twitter and the rest of my channels. There are no words to describe the amount of work we put into this! HARD WORK AT ITS FINEST! PS: Just to let you guys know, it is 2:30AM here in London. When I promise something, I will do it even if I don’t get enough sleep! lol What are you waiting for? ?????????? Click the link in my bio ? @vaniccilondon because you’ll be one of the first few people to access this! Hint: “You Wish You’d Known This Information Sooner!” Look forward to working together as a team! ??????