Thursday, January 30, 2025
HomeAppleMultiple Malicious Fitness Tracker apps Abusing Apple’s Touch ID Feature To Steal...

Multiple Malicious Fitness Tracker apps Abusing Apple’s Touch ID Feature To Steal Money From iOS Users

Published on

SIEM as a Service

Follow Us on Google News

Multiple malicious iOS Fitness Tracker apps caught stealing users money by abusing Apple’s Touch ID feature. The apps involved in such malicious activity are “Fitness Balance app” and “Calories Tracker app”.

Those bogus apps uploaded to the Apple App Store recently and they promise users to give away for a healthier lifestyle by tracking daily calorie intake and BMI.

Once the user installed the apps and starts for the first time, it asks users for a fingerprint scan to set up their personalized calorie tracker and diet recommendations.

According to ESET researcher Stefanko, who analyzed the apps said that, if the user places the fingerprint on the fingerprint scanner then the app displays a display a pop-up for seconds showing a dodgy payment amounting to 99.99, 119.99 USD or 139.99 EUR.

The pop-up displays just only for seconds, if the user has credit or debit card directly connected with their Apple account then the transaction got verified and the money will be sent to the operator behind the scam.

Based on the functionality and the design, both of the iOS Fitness Tracker apps created by the same developer, Sefanko added.

If the users refuse to scan their finger “Fitness Balance app” and it will trigger another pop-up with continue button, if the users click on the continue button and it will repeat the unreliable payment method.

Fitness Balance app have received have received multiple 5-star ratings and has an average rating of 4.3 stars, the scammers post fake reviews to increase the application reputation.

Reddit user posted videos on “Fitness Balance app” and “Calories Tracker app”, describing how the apps stealing payments from users.

Now the apps have been removed from the play store and the users who fell victim of this scam can get refunds from Apple App Store.

Related Read

Apple Released Security Updates for iOS, watchOS, Safari, tvOS, iTunes & Fixed Several Vulnerabilities

Roaming Mantis Hacking Group Inject Web Crypto Mining for iOS Devices via Malicious Content Delivery System

Hackers using Android & iOS Spyware “Pegasus” to Conducting Massive Surveillance Operations in 45 Countries

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

Hackers Impersonate Top Tax Firm with 40,000 Phishing Messages to Steal Credentials

Proofpoint researchers have identified a marked increase in phishing campaigns and malicious domain registrations...

Cybercriminals Exploit Public-Facing IIS, Apache, and SQL Servers to Breach Gov & Telecom Systems

A recent investigation by Unit 42 of Palo Alto Networks has uncovered a sophisticated,...

Doppler Announces Integration with Datadog to Streamline Security and Monitoring

Doppler, the leading provider of secrets management solutions, announced a new integration with Datadog,...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

Hackers Impersonate Top Tax Firm with 40,000 Phishing Messages to Steal Credentials

Proofpoint researchers have identified a marked increase in phishing campaigns and malicious domain registrations...

Cybercriminals Exploit Public-Facing IIS, Apache, and SQL Servers to Breach Gov & Telecom Systems

A recent investigation by Unit 42 of Palo Alto Networks has uncovered a sophisticated,...