Apple pulls iOS apps mining your iPhone for private data

19.10.2015
App analytics firm SourceDNA just discovered evidence that hundreds of apps in the iOS App Store are collecting a whole bunch of identifying data about you in violation of Apple’s privacy policy. The apps are all using the Chinese advertising SDK Youmi, which was pulling data from private APIs unbeknownst to Apple.

Youmi’s code calls the list of all the apps you have installed on your phone, the email associated with your Apple ID, the serial numbers of the peripherals inside your device, and if you’re running an older version of iOS, the SDK can call the platform serial number of your device.

Why this matters: This is the third time in the last month that shady code has been discovered in Apple-approved iOS apps. Developers using an infected version of Apple’s Xcode, which is used to build iOS apps, were unknowingly allowing malware to potentially phish your iCloud and Apple ID information. The malware also had the ability to access your clipboard, which could have had major ramifications for people who use password management apps. Earlier this month, Apple found that some content-blocking apps were installing root certificates on your iPhone to block ads in other apps, not just Safari. Those apps were pulled, too.

Apple is now aware of the situation, confirming to Ars Technica that it will remove the apps using Youmi’s SDK from the App Store and reject any future apps using the SDK:

SourceDNA found 256 apps using the SDK. Those apps, mostly out of China, have been downloaded approximately 1 million times. Developers probably didn’t realize Youmi’s SDK was pulling private data, the analytics firm said, because the info the app collects is routed to Youmi’s server, not the app’s. This has has been going on for more than a year.

It’s unclear which apps have been affected, though SourceDNA has provided Apple with the full list.

(www.macworld.com)

Caitlin McGarry

Zur Startseite