{"id":2685,"date":"2013-09-10T14:30:08","date_gmt":"2013-09-10T18:30:08","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=2685"},"modified":"2017-09-24T08:23:48","modified_gmt":"2017-09-24T12:23:48","slug":"fraudulent-apps-on-apples-app-store","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/fraudulent-apps-on-apples-app-store\/2685\/","title":{"rendered":"Fraudulent Apps on Apple&#8217;s App Store"},"content":{"rendered":"<p>You have probably already heard about the security of iOS and how Apple controls its App Store. In fact, they are doing an exceptional job since the release of iOS, blocking and filtering potentially malicious programs, but there are a <a href=\"https:\/\/www.securelist.com\/en\/blog\/208193641\/Find_and_Call_Leak_and_Spam\" target=\"_blank\" rel=\"noopener nofollow\">few incidents of malicious apps<\/a> being distributed in the store. All of Apple\u2019s control is not perfect and does not prevent bad-intentioned developers from publishing fraudulent apps. The goal of those developers is the same as mobile malware creators: to steal your money and make you buy an ill-intentioned program.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/09\/06045757\/fraud_title_EN.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2686\" alt=\"fraud_title_EN\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/09\/06045757\/fraud_title_EN.jpg\" width=\"640\" height=\"420\"><\/a><\/p>\n<p>These fraudulent apps try to catch your attention, offering features that do not exist natively on iOS, such as <b>blocking unwanted calls<\/b> or <b>changing the lock screen<\/b> of your phone. How were these developers able to publish these fraudulent apps, bypassing Apple\u2019s rigid control? We can\u2019t really be sure.<\/p>\n<p>A simple search on the iTunes Store for \u201cblock calls\u201d shows us 2 fraudulent apps, like those shown here, costing $4.99 and $1.99 respectively:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/09\/06045755\/fake-ios-app1b.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2687\" alt=\"fake-ios-app1b\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/09\/06045755\/fake-ios-app1b.png\" width=\"640\" height=\"404\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/09\/06045754\/fake-ios-app1.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2688\" alt=\"fake-ios-app1\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/09\/06045754\/fake-ios-app1.png\" width=\"640\" height=\"407\"><\/a><\/p>\n<p>These apps are fraudulent, because it\u2019s not possible for a third-party app to block calls in the current structure of iOS 6. \u00a0We found these apps published on the iTunes Store for US, Mexico and Brazil, where several users are asking for their money back as they were victims of fraud.<\/p>\n<p>Another fraudulent app published on the Mexican iTunes Store offers a fingerprint scanner to control access and block the device, a feature that do not exist on iPhones right now:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/09\/06045752\/fake-ios-app2.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2689\" alt=\"fake-ios-app2\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/09\/06045752\/fake-ios-app2.png\" width=\"640\" height=\"360\"><\/a><\/p>\n<p>The good news for iPhone users is that Apple is implementing some of these desired features, such as the blocking of unwanted call in the new iOS 7. So, if you are looking for this feature, just wait for the new system.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/09\/06045750\/ios7-blocking.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2690\" alt=\"ios7-blocking\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/09\/06045750\/ios7-blocking.jpg\" width=\"350\" height=\"525\"><\/a><\/p>\n<p>To prevent losses associated with fraudulent apps, we suggest all iOS users read the reviews and check ratings before buying an application. Do not believe in magical features that do not exist in your phone, no app is able to do things that Apple does not allow.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/09\/06045749\/fake-ios-app4.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2691\" alt=\"fake-ios-app4\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/09\/06045749\/fake-ios-app4.png\" width=\"361\" height=\"404\"><\/a><\/p>\n<p>If you were the victim of such apps, you can try asking Apple to refund your money, by following these steps:<\/p>\n<ul>\n<li>Open iTunes and select the iTunes Store link in the left-hand column;<\/li>\n<li>Near the top right corner, click the arrow next to your username (email address) and then select Account;<\/li>\n<li>About halfway down the screen, click the Purchase History button;<\/li>\n<li>In the bottom portion of the screen, you will see your App Store purchase history \u2013 click the Report a Problem button;<\/li>\n<li>Locate the iTunes invoice with the application you would like a refund for, and click the Report a Problem link<\/li>\n<li>Fill out the form that follows and be sure to be as detailed as possible \u2013 when finished, click Next<\/li>\n<\/ul>\n<p>If your reason for requesting a refund is valid, Apple should respond within a few days and process your refund within a week.<\/p>\n<p>Don\u2019t be deceived by fraudulent apps and stay safe!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You have probably already heard about the security of iOS and how Apple controls its App Store. In fact, they are doing an exceptional job since the release of iOS,<\/p>\n","protected":false},"author":332,"featured_media":2692,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[14,109,26],"class_list":{"0":"post-2685","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-apple","9":"tag-apps","10":"tag-iphone"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/fraudulent-apps-on-apples-app-store\/2685\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/fraudulent-apps-on-apples-app-store\/2414\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/fraudulent-apps-on-apples-app-store\/2318\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/fraudulent-apps-on-apples-app-store\/2506\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/fraudulent-apps-on-apples-app-store\/2358\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/fraudulent-apps-on-apples-app-store\/1575\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/fraudulent-apps-on-apples-app-store\/2685\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/fraudulent-apps-on-apples-app-store\/2685\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/apple\/","name":"Apple"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/332"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2685"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2685\/revisions"}],"predecessor-version":[{"id":19470,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2685\/revisions\/19470"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/2692"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}