Repackaging detection
  • 22 Jan 2025
  • 1 Minute à lire
  • Sombre
    Lumière
  • PDF

Repackaging detection

  • Sombre
    Lumière
  • PDF

The content is currently unavailable in French. You are viewing the default English version.
Résumé de l’article

Repackaging means that an attacker can obtain a copy of an application, add malicious functionality such as a keylogger, and then offer it to users who believe that they are using the original application.

Repackaging has also been used by attackers to offer people access to apps which are usually sold through the App Store - either as paid apps or subscription apps - illegally and for free/reduced price. Other common motivations for repackaging are to remove unwanted functionality, or add new functionality to an app (such as cheats to a game).

This type of attack is made possible since Apple has an alternative distribution mechanism apart from the App Store called enterprise distribution.

Repackaged apps which are unsigned or wrongly signed can also be used on e.g. jailbroken devices.

The act of repackaging the application can also be used when attempting to reverse-engineer an application.

App Shielding offers the possibility to detect and react when an application has been repackaged. Furthermore, App Shielding creates a strong binding between the app and App Shielding. With this, the security features provided by App Shielding cannot be disabled by simply removing App Shielding from the app.


Cet article vous a-t-il été utile ?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Ozzy, facilitant la découverte de connaissances grâce à l’intelligence conversationnelle