SlideShare a Scribd company logo
PREPARED BY:
Shakti Chauhan 12xxxxxxx
Ruchika Jain12xxxxxxx
 In July 2014, FireEye Security Company with the security
researchers Stefan Esser and Jonathan Zdziarski discovered1 that
an iOS app installed using enterprise/ad-hoc provisioning could
replace another genuine app previously installed through the
App Store, as long as both apps used the same bundle identifier.
 This vulnerability exists because iOS doesn't enforce matching
certificates for apps with the same bundle identifier.
 The malicious app could be downloaded and installed by a user
via social engineering attacks: once done that, the new app
overwrites the old one already installed on the device.
 An exception is represented by the iOS preinstalled apps: they
can’t be substituted.
 It is important to note that this attack poses iOS users at a
greater risk than the Android counterpart. In fact on Android
exists an option that disallow users to install application from
sources different from the Play Store, while on iOS this choice is
not available.
These are the main threat scenarios of this kind of attack:
 Non jailbroken iOS Apple devices are threatened too;
 A user may not be conscious of having a malicious app on his
device because it replaces one that is regularly installed;
 The malicious app can read all the unencrypted data stored by
the previous app, but the Keychain, and send them to their
servers;
 The malicious app can mount a phishing attack mimicking the
original UI app and it can steal the related credentials;
 The malicious app can be launched although the presence of an
alert prompt when launching enterprise-signed apps for the first
time;
 The malicious app can hijack the URL Schemes of a legitimate
popular app in order to perform phishing attacks to steal
credentials or gather data intended to be shared between two
trusted apps.
Environment Setup
 An enterprise provisioning profile matched with a developer
certificate were used to perpetrate the attack: the public key
inside the first file is related to the private key of the certificate
installed on the host where the compilation of the app is
performed.
 The app is installed on the device via OTA, using a local HTTPS
web server.
 It has to be noticed the fact that developer certificates and
mobile enterprise provisioning files can be easily found on
Internet through ad-hoc Google dorks. Following a screenshot of
a website where these files can be located:
 For the signing part of the created IPA, the iReSign tool was used
(https://github.com/maciekish/iReSign):
 As we can see, the IPA can be signed with a smuggled developer
certificate.
 On 19 February 2015 FireEye security researchers have
presented a new kind of Masque Attack exploiting URL Schemes
vulnerabilities2.
 On iOS 8, whenever a user is launching an enterprise-signed app
for the first time, he is asked to trust or not the new signing
party, as can be seen from the following screenshot:
 If a user clicks on “Don’t trust” the app does not open.
 It has been discovered that this precaution is not enough:
indeed, it is possible to bypass this alert message exploiting the
present implementation of URL Schemes.
 This can be demonstrated using the following setup: An Apple
device with iOS 8.1.2 installed; A widespread installed app like,
for example, Facebook; An enterprise-signed app registering
an URL Scheme identical to that used by the previous app.
 So, it is possible to create an enterprise-signed app registering
an URL Schemes used by Facebook, fb://, and bypass the alert
prompt calling that URL Scheme to open the malicious app.
 Update iOS on the device to a version >= 8.1.3 as suggested
above. Note that the URL Schemes Hijacking vulnerability
illustrated at the end of section 2.4 has not yet been fixed;
 Don’t install apps from third-party sources other than
Apple’s official App Store or the user’s own organization;
 Don’t click “Install” on a pop-up from a third-party web page;
 When opening an app, if iOS shows an alert with “Untrusted
App Developer”, click on “Don’t Trust” and uninstall the app
immediately. Nevertheless note that this alert can be
bypassed as shown in section 2.4 if iOS >= 8.1.3 is not
installed.
THANK
YOU

More Related Content

What's hot

Code Red Worm
Code Red WormCode Red Worm
Code Red WormRaDe0N
 
Remove open cloud security
Remove open cloud securityRemove open cloud security
Remove open cloud security
charliedavibrown
 
Iloveyou virus
Iloveyou virusIloveyou virus
Iloveyou virus
7esBoss12
 
Android Security
Android SecurityAndroid Security
Android Security
Lars Jacobs
 
10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security
Hybrid IT Solutions
 
Code Red Virus
Code Red VirusCode Red Virus
Code Red Virussmithz
 
Cloud Attacks: A Live Simulation of Cloud MIsconfiguration Attacks
Cloud Attacks: A Live Simulation of Cloud MIsconfiguration AttacksCloud Attacks: A Live Simulation of Cloud MIsconfiguration Attacks
Cloud Attacks: A Live Simulation of Cloud MIsconfiguration Attacks
DiemShin
 
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
IBM Security
 
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
IBM Security
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
Lookout
 
Sperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft talks: Android Security Threats
Sperasoft talks: Android Security Threats
Sperasoft
 
Android Security & Penetration Testing
Android Security & Penetration TestingAndroid Security & Penetration Testing
Android Security & Penetration Testing
Subho Halder
 
Android Security Development
Android Security DevelopmentAndroid Security Development
Android Security Development
hackstuff
 
Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Prathan Phongthiproek
 
4 mobile security threats companies must look out for
4 mobile security threats companies must look out for4 mobile security threats companies must look out for
4 mobile security threats companies must look out for
House of IT
 
[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop
OWASP
 

What's hot (20)

Code Red Worm
Code Red WormCode Red Worm
Code Red Worm
 
Remove open cloud security
Remove open cloud securityRemove open cloud security
Remove open cloud security
 
Iloveyou virus
Iloveyou virusIloveyou virus
Iloveyou virus
 
I Love You =D
I Love You =DI Love You =D
I Love You =D
 
Android Security
Android SecurityAndroid Security
Android Security
 
10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security
 
Code Red Virus
Code Red VirusCode Red Virus
Code Red Virus
 
Cloud Attacks: A Live Simulation of Cloud MIsconfiguration Attacks
Cloud Attacks: A Live Simulation of Cloud MIsconfiguration AttacksCloud Attacks: A Live Simulation of Cloud MIsconfiguration Attacks
Cloud Attacks: A Live Simulation of Cloud MIsconfiguration Attacks
 
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
 
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Sperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft talks: Android Security Threats
Sperasoft talks: Android Security Threats
 
Android Security & Penetration Testing
Android Security & Penetration TestingAndroid Security & Penetration Testing
Android Security & Penetration Testing
 
Android Security Development
Android Security DevelopmentAndroid Security Development
Android Security Development
 
Punto 16
Punto 16Punto 16
Punto 16
 
Punto 16
Punto 16Punto 16
Punto 16
 
Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]
 
Security
SecuritySecurity
Security
 
4 mobile security threats companies must look out for
4 mobile security threats companies must look out for4 mobile security threats companies must look out for
4 mobile security threats companies must look out for
 
[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop
 

Viewers also liked

Xinwen
XinwenXinwen
Xinwen
xinwen107
 
Depression & Suicide Prevention Intervention Program Plan Narrative Part 1
Depression & Suicide Prevention Intervention Program Plan Narrative Part 1Depression & Suicide Prevention Intervention Program Plan Narrative Part 1
Depression & Suicide Prevention Intervention Program Plan Narrative Part 1Icahn School of Medicine at Mount Sinai
 
Depression & Suicide Prevention Intervention Program Plan Narrative Part 2
Depression & Suicide Prevention Intervention Program Plan Narrative Part 2Depression & Suicide Prevention Intervention Program Plan Narrative Part 2
Depression & Suicide Prevention Intervention Program Plan Narrative Part 2Icahn School of Medicine at Mount Sinai
 
Hallituksen esitys julkisesta työvoima ja yrityspalvelusta annetun lain, työ...
Hallituksen esitys julkisesta työvoima  ja yrityspalvelusta annetun lain, työ...Hallituksen esitys julkisesta työvoima  ja yrityspalvelusta annetun lain, työ...
Hallituksen esitys julkisesta työvoima ja yrityspalvelusta annetun lain, työ...
Työ- ja elinkeinoministeriö
 
Rubrica
RubricaRubrica
Rubrica
evelop17
 
Johtaja Olli Kosken kommenttipuheenvuoro 24.1.2017
Johtaja Olli Kosken kommenttipuheenvuoro 24.1.2017Johtaja Olli Kosken kommenttipuheenvuoro 24.1.2017
Johtaja Olli Kosken kommenttipuheenvuoro 24.1.2017
Työ- ja elinkeinoministeriö
 
The things that matter the most - change the most slowly
The things that matter the most - change the most slowlyThe things that matter the most - change the most slowly
The things that matter the most - change the most slowly
Clive Dickens
 
Digitaalisuus, sosiaalinen media ja opetuksen kehittäminen käytännössä
Digitaalisuus, sosiaalinen media ja opetuksen kehittäminen käytännössäDigitaalisuus, sosiaalinen media ja opetuksen kehittäminen käytännössä
Digitaalisuus, sosiaalinen media ja opetuksen kehittäminen käytännössä
Harto Pönkä
 

Viewers also liked (13)

Xinwen
XinwenXinwen
Xinwen
 
Depression & Suicide Prevention Intervention Program Plan Narrative Part 1
Depression & Suicide Prevention Intervention Program Plan Narrative Part 1Depression & Suicide Prevention Intervention Program Plan Narrative Part 1
Depression & Suicide Prevention Intervention Program Plan Narrative Part 1
 
Depression & Suicide Prevention Intervention Program Plan Narrative Part 2
Depression & Suicide Prevention Intervention Program Plan Narrative Part 2Depression & Suicide Prevention Intervention Program Plan Narrative Part 2
Depression & Suicide Prevention Intervention Program Plan Narrative Part 2
 
Transcript Law online
Transcript Law onlineTranscript Law online
Transcript Law online
 
Oxalisilk tm pres
Oxalisilk tm presOxalisilk tm pres
Oxalisilk tm pres
 
CV-RMC
CV-RMCCV-RMC
CV-RMC
 
Europass english
Europass englishEuropass english
Europass english
 
Karen's English CV
Karen's English CVKaren's English CV
Karen's English CV
 
Hallituksen esitys julkisesta työvoima ja yrityspalvelusta annetun lain, työ...
Hallituksen esitys julkisesta työvoima  ja yrityspalvelusta annetun lain, työ...Hallituksen esitys julkisesta työvoima  ja yrityspalvelusta annetun lain, työ...
Hallituksen esitys julkisesta työvoima ja yrityspalvelusta annetun lain, työ...
 
Rubrica
RubricaRubrica
Rubrica
 
Johtaja Olli Kosken kommenttipuheenvuoro 24.1.2017
Johtaja Olli Kosken kommenttipuheenvuoro 24.1.2017Johtaja Olli Kosken kommenttipuheenvuoro 24.1.2017
Johtaja Olli Kosken kommenttipuheenvuoro 24.1.2017
 
The things that matter the most - change the most slowly
The things that matter the most - change the most slowlyThe things that matter the most - change the most slowly
The things that matter the most - change the most slowly
 
Digitaalisuus, sosiaalinen media ja opetuksen kehittäminen käytännössä
Digitaalisuus, sosiaalinen media ja opetuksen kehittäminen käytännössäDigitaalisuus, sosiaalinen media ja opetuksen kehittäminen käytännössä
Digitaalisuus, sosiaalinen media ja opetuksen kehittäminen käytännössä
 

Similar to Masque attack

iOS Masque Attack
iOS Masque AttackiOS Masque Attack
iOS Masque Attack
Minded Security
 
Apple threat-landscape
Apple threat-landscapeApple threat-landscape
Apple threat-landscape
Andrey Apuhtin
 
1.2-4 apps.pptx
1.2-4 apps.pptx1.2-4 apps.pptx
1.2-4 apps.pptx
mardy10
 
Wirelurker
WirelurkerWirelurker
Wirelurker
anupriti
 
How to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdfHow to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdf
venkatprasadvadla1
 
Pentestflashkeybpardpaper
PentestflashkeybpardpaperPentestflashkeybpardpaper
Pentestflashkeybpardpaper
Andrey Apuhtin
 
Top Mobile Application Penetration Testing Tools for Android and iOS.pdf
Top Mobile Application Penetration Testing Tools for Android and iOS.pdfTop Mobile Application Penetration Testing Tools for Android and iOS.pdf
Top Mobile Application Penetration Testing Tools for Android and iOS.pdf
ElanusTechnologies
 
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Subho Halder
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application Security
Marie Weaver
 
iOS Application Security And Static Analysis.pdf
iOS Application Security And Static Analysis.pdfiOS Application Security And Static Analysis.pdf
iOS Application Security And Static Analysis.pdf
Cyber security professional services- Detox techno
 
Android FakeID Vulnerability
Android FakeID VulnerabilityAndroid FakeID Vulnerability
Android FakeID VulnerabilityMark Laubender
 
Tips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdfTips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdf
FuGenx Technologies
 
apidays LIVE New York 2021 - Playing with FHIR without getting burned by Dav...
apidays LIVE New York 2021 - Playing with FHIR without getting burned by  Dav...apidays LIVE New York 2021 - Playing with FHIR without getting burned by  Dav...
apidays LIVE New York 2021 - Playing with FHIR without getting burned by Dav...
apidays
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
Anjoum .
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malwareSytelReplyUK
 
4 Ways to Build an App Without Code | AppSheet
4 Ways to Build an App Without Code | AppSheet4 Ways to Build an App Without Code | AppSheet
4 Ways to Build an App Without Code | AppSheet
AppSheet
 
Top Practices You Need To Develop Secure Mobile Apps.
Top Practices You Need To Develop Secure Mobile Apps.Top Practices You Need To Develop Secure Mobile Apps.
Top Practices You Need To Develop Secure Mobile Apps.
Techugo
 
How to Spy on a Phone Without Having Access to it?
How to Spy on a Phone Without Having Access to it?How to Spy on a Phone Without Having Access to it?
How to Spy on a Phone Without Having Access to it?
XNSPY
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
Anti-tampering in Android and Take Look at Google SafetyNet Attestation APIAnti-tampering in Android and Take Look at Google SafetyNet Attestation API
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
Arash Ramez
 

Similar to Masque attack (20)

iOS Masque Attack
iOS Masque AttackiOS Masque Attack
iOS Masque Attack
 
Apple threat-landscape
Apple threat-landscapeApple threat-landscape
Apple threat-landscape
 
1.2-4 apps.pptx
1.2-4 apps.pptx1.2-4 apps.pptx
1.2-4 apps.pptx
 
Wirelurker
WirelurkerWirelurker
Wirelurker
 
How to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdfHow to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdf
 
Pentestflashkeybpardpaper
PentestflashkeybpardpaperPentestflashkeybpardpaper
Pentestflashkeybpardpaper
 
Top Mobile Application Penetration Testing Tools for Android and iOS.pdf
Top Mobile Application Penetration Testing Tools for Android and iOS.pdfTop Mobile Application Penetration Testing Tools for Android and iOS.pdf
Top Mobile Application Penetration Testing Tools for Android and iOS.pdf
 
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application Security
 
iOS Application Security And Static Analysis.pdf
iOS Application Security And Static Analysis.pdfiOS Application Security And Static Analysis.pdf
iOS Application Security And Static Analysis.pdf
 
Android FakeID Vulnerability
Android FakeID VulnerabilityAndroid FakeID Vulnerability
Android FakeID Vulnerability
 
Tips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdfTips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdf
 
apidays LIVE New York 2021 - Playing with FHIR without getting burned by Dav...
apidays LIVE New York 2021 - Playing with FHIR without getting burned by  Dav...apidays LIVE New York 2021 - Playing with FHIR without getting burned by  Dav...
apidays LIVE New York 2021 - Playing with FHIR without getting burned by Dav...
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
 
4 Ways to Build an App Without Code | AppSheet
4 Ways to Build an App Without Code | AppSheet4 Ways to Build an App Without Code | AppSheet
4 Ways to Build an App Without Code | AppSheet
 
Top Practices You Need To Develop Secure Mobile Apps.
Top Practices You Need To Develop Secure Mobile Apps.Top Practices You Need To Develop Secure Mobile Apps.
Top Practices You Need To Develop Secure Mobile Apps.
 
How to Spy on a Phone Without Having Access to it?
How to Spy on a Phone Without Having Access to it?How to Spy on a Phone Without Having Access to it?
How to Spy on a Phone Without Having Access to it?
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
Anti-tampering in Android and Take Look at Google SafetyNet Attestation APIAnti-tampering in Android and Take Look at Google SafetyNet Attestation API
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
 

Masque attack

  • 1. PREPARED BY: Shakti Chauhan 12xxxxxxx Ruchika Jain12xxxxxxx
  • 2.
  • 3.  In July 2014, FireEye Security Company with the security researchers Stefan Esser and Jonathan Zdziarski discovered1 that an iOS app installed using enterprise/ad-hoc provisioning could replace another genuine app previously installed through the App Store, as long as both apps used the same bundle identifier.  This vulnerability exists because iOS doesn't enforce matching certificates for apps with the same bundle identifier.  The malicious app could be downloaded and installed by a user via social engineering attacks: once done that, the new app overwrites the old one already installed on the device.  An exception is represented by the iOS preinstalled apps: they can’t be substituted.  It is important to note that this attack poses iOS users at a greater risk than the Android counterpart. In fact on Android exists an option that disallow users to install application from sources different from the Play Store, while on iOS this choice is not available.
  • 4.
  • 5. These are the main threat scenarios of this kind of attack:  Non jailbroken iOS Apple devices are threatened too;  A user may not be conscious of having a malicious app on his device because it replaces one that is regularly installed;  The malicious app can read all the unencrypted data stored by the previous app, but the Keychain, and send them to their servers;  The malicious app can mount a phishing attack mimicking the original UI app and it can steal the related credentials;  The malicious app can be launched although the presence of an alert prompt when launching enterprise-signed apps for the first time;  The malicious app can hijack the URL Schemes of a legitimate popular app in order to perform phishing attacks to steal credentials or gather data intended to be shared between two trusted apps.
  • 6.
  • 7. Environment Setup  An enterprise provisioning profile matched with a developer certificate were used to perpetrate the attack: the public key inside the first file is related to the private key of the certificate installed on the host where the compilation of the app is performed.  The app is installed on the device via OTA, using a local HTTPS web server.  It has to be noticed the fact that developer certificates and mobile enterprise provisioning files can be easily found on Internet through ad-hoc Google dorks. Following a screenshot of a website where these files can be located:  For the signing part of the created IPA, the iReSign tool was used (https://github.com/maciekish/iReSign):  As we can see, the IPA can be signed with a smuggled developer certificate.
  • 8.  On 19 February 2015 FireEye security researchers have presented a new kind of Masque Attack exploiting URL Schemes vulnerabilities2.  On iOS 8, whenever a user is launching an enterprise-signed app for the first time, he is asked to trust or not the new signing party, as can be seen from the following screenshot:  If a user clicks on “Don’t trust” the app does not open.  It has been discovered that this precaution is not enough: indeed, it is possible to bypass this alert message exploiting the present implementation of URL Schemes.  This can be demonstrated using the following setup: An Apple device with iOS 8.1.2 installed; A widespread installed app like, for example, Facebook; An enterprise-signed app registering an URL Scheme identical to that used by the previous app.  So, it is possible to create an enterprise-signed app registering an URL Schemes used by Facebook, fb://, and bypass the alert prompt calling that URL Scheme to open the malicious app.
  • 9.
  • 10.
  • 11.  Update iOS on the device to a version >= 8.1.3 as suggested above. Note that the URL Schemes Hijacking vulnerability illustrated at the end of section 2.4 has not yet been fixed;  Don’t install apps from third-party sources other than Apple’s official App Store or the user’s own organization;  Don’t click “Install” on a pop-up from a third-party web page;  When opening an app, if iOS shows an alert with “Untrusted App Developer”, click on “Don’t Trust” and uninstall the app immediately. Nevertheless note that this alert can be bypassed as shown in section 2.4 if iOS >= 8.1.3 is not installed.
  • 12.