TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Technical Analysis – Improper Use of Private iOS APIs in Vietnamese Banking Apps

90 pointsby quyleanhabout 2 months ago

6 comments

alephnerdabout 1 month ago
Sadly, it goes well beyond BIDV and Agribank as well. There is a lot of similar hacky fingerprinting done by all the Vietnamese banking apps.<p>My understanding is it&#x27;s because there was some regulatory change in the last 1-2 years requiring identity fingerprinting using banking apps, and partially related with the new biometrics rollout [0]<p>[0] - <a href="https:&#x2F;&#x2F;xaydungchinhsach.chinhphu.vn&#x2F;huong-dan-cai-dat-sinh-trac-hoc-tren-ung-dung-ngan-hang-119240630230745915.htm" rel="nofollow">https:&#x2F;&#x2F;xaydungchinhsach.chinhphu.vn&#x2F;huong-dan-cai-dat-sinh-...</a>
评论 #43536648 未加载
bradyriddleabout 1 month ago
I&#x27;m curious about this. I&#x27;m familiar with reversing http api calls using a mitm proxy. But this ain&#x27;t that.<p>Are they able to load a .so&#x2F;dylib file during runtime and just call a method on it as long as they know the name of the method? How does iOS even allow that? How does an iOS even get to load those files? Seems like that would be locked down.
评论 #43537564 未加载
评论 #43537050 未加载
评论 #43537125 未加载
quyleanhabout 2 months ago
Original hightlight from @opa334, developer of TrollStore [0]. There are also some sharing about that on his page like sandbox escape published by @wh1te4ever [1]<p>0: <a href="https:&#x2F;&#x2F;infosec.exchange&#x2F;@opa334&#x2F;114224756352953362" rel="nofollow">https:&#x2F;&#x2F;infosec.exchange&#x2F;@opa334&#x2F;114224756352953362</a><p>1: <a href="https:&#x2F;&#x2F;gist.github.com&#x2F;wh1te4ever&#x2F;c7909dcb5b66c13a217b49ea3e320caf" rel="nofollow">https:&#x2F;&#x2F;gist.github.com&#x2F;wh1te4ever&#x2F;c7909dcb5b66c13a217b49ea3...</a>
a012about 1 month ago
The banking apps exploited non-public APIs to provide “protection” for users, it doesn’t sound right
评论 #43536302 未加载
musjlemanabout 1 month ago
Showing a 5000$ bounty example of &quot;enumerating all apps&quot; sounds a bit disingenuous when this is more of a &quot;check if this exact app by bundle name was installed not through store.<p>I also don&#x27;t think that this deserves to be called anything as scary as an &quot;zero day exploit&quot;, &quot;sandbox escape&quot;.
评论 #43537719 未加载
petesergeantabout 1 month ago
So, the post author makes software for checking if bad apps are running on the phone, and is complaining that the banks are using their own home-grown system that they say violates Apple’s rules for checking for malicious apps, rather than doing is safely like the software the author sells does.
评论 #43534580 未加载
评论 #43534814 未加载