Sunday, October 13, 2024
HomeAppleMultiple Malicious Fitness Tracker apps Abusing Apple’s Touch ID Feature To Steal...

Multiple Malicious Fitness Tracker apps Abusing Apple’s Touch ID Feature To Steal Money From iOS Users

Published on

Malware protection

Multiple malicious iOS Fitness Tracker apps caught stealing users money by abusing Apple’s Touch ID feature. The apps involved in such malicious activity are “Fitness Balance app” and “Calories Tracker app”.

Those bogus apps uploaded to the Apple App Store recently and they promise users to give away for a healthier lifestyle by tracking daily calorie intake and BMI.

Once the user installed the apps and starts for the first time, it asks users for a fingerprint scan to set up their personalized calorie tracker and diet recommendations.

- Advertisement - SIEM as a Service

According to ESET researcher Stefanko, who analyzed the apps said that, if the user places the fingerprint on the fingerprint scanner then the app displays a display a pop-up for seconds showing a dodgy payment amounting to 99.99, 119.99 USD or 139.99 EUR.

The pop-up displays just only for seconds, if the user has credit or debit card directly connected with their Apple account then the transaction got verified and the money will be sent to the operator behind the scam.

Based on the functionality and the design, both of the iOS Fitness Tracker apps created by the same developer, Sefanko added.

If the users refuse to scan their finger “Fitness Balance app” and it will trigger another pop-up with continue button, if the users click on the continue button and it will repeat the unreliable payment method.

Fitness Balance app have received have received multiple 5-star ratings and has an average rating of 4.3 stars, the scammers post fake reviews to increase the application reputation.

Reddit user posted videos on “Fitness Balance app” and “Calories Tracker app”, describing how the apps stealing payments from users.

Now the apps have been removed from the play store and the users who fell victim of this scam can get refunds from Apple App Store.

Related Read

Apple Released Security Updates for iOS, watchOS, Safari, tvOS, iTunes & Fixed Several Vulnerabilities

Roaming Mantis Hacking Group Inject Web Crypto Mining for iOS Devices via Malicious Content Delivery System

Hackers using Android & iOS Spyware “Pegasus” to Conducting Massive Surveillance Operations in 45 Countries

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication...

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being...

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading...

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks

The agreement has marked over 600,000 fraudulent domains for takedown in just two months...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication...

Hackers Exploiting Zero-day Flaw in Qualcomm Chips to Attack Android Users

Hackers exploit a zero-day vulnerability found in Qualcomm chipsets, potentially affecting millions worldwide.The flaw,...

Foxit PDF Reader Vulnerability Let Attackers Execute Arbitary Code

Researchers recently disclosed six new security vulnerabilities across various software, as one critical vulnerability...