{"id":1093,"date":"2020-08-25T07:46:30","date_gmt":"2020-08-25T14:46:30","guid":{"rendered":"https:\/\/www.karlstechnology.com\/blog\/?p=1093"},"modified":"2020-08-25T07:46:32","modified_gmt":"2020-08-25T14:46:32","slug":"hackers-believe-to-steal-ad-revenue-on-ios","status":"publish","type":"post","link":"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/","title":{"rendered":"Hackers Believe to Steal Ad Revenue on iOS"},"content":{"rendered":"\n<p>It&#8217;s no known secret that hackers are finding any way possible to insert malicious code to invade privacy and steal important information from potential victims. <a href=\"https:\/\/snyk.io\/research\/sour-mint-malicious-sdk\/\">Synk<\/a>, a software security business, shared a Chinese mobile ad vulnerability in iOS, implicating they were committing fraud through ads. They stated the following:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>&#8220;We have identified that mintegral iOS SDK versions 5.5.1 and above contain malicious functionality which leads to information leakage. In simple terms the SDK is spying on user link clicking, and network activity within the affected apps. The spying occurs even if the SDK was not enabled by the developer or the ad mediation platform.&#8221;<\/p><\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"342\" src=\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2020\/08\/logo-solid-background.png\" alt=\"\" class=\"wp-image-1094\" srcset=\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2020\/08\/logo-solid-background.png 602w, https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2020\/08\/logo-solid-background-300x170.png 300w\" sizes=\"(max-width: 602px) 100vw, 602px\" \/><figcaption>Source: Synk Press Kit<\/figcaption><\/figure>\n\n\n\n<p>The statements show that SDK makes iOS think that a different ad is being clicked on, therefore the ad revenue is being sent elsewhere instead of the actual business of the ad. The Chinese mobile ad, called <a href=\"https:\/\/www.prnewswire.com\/news-releases\/mintegral-releases-statement-denying-sdk-allegations-301117552.html\">Mintegral<\/a> has stated it has been cooperating with Apple, while maintaining their innocence in the attack to steal information and ad revenue. <\/p>\n\n\n\n<p>This vicious intended code seems to only have been seen on iOS and not on Android just yet. The first code was seen over a year ago, in July 2019.<\/p>\n\n\n\n<p>For inquiries about vulnerabilities, call us at\u00a0<a href=\"tel:1-800-620-5285\">1-800-620-5285<\/a>. \u00a0Karls Technology is a nationwide computer service company with offices in many major cities. This blog post was brought to you from our staff at the\u00a0<a href=\"https:\/\/www.goodyearcomputerrepairservice.com\/\">Goodyear Computer Repair Service<\/a>, if you need computer repair in Goodyear, Arizona please call or text the local office at\u00a0<a href=\"tel:623-295-2645\">(623) 295-2645<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s no known secret that hackers are finding any way possible to insert malicious code to invade privacy and steal important information from potential victims. Synk, a software security business, shared a Chinese mobile ad vulnerability in iOS, implicating they were committing fraud through ads. They stated the following: &#8220;We have identified that mintegral iOS [&hellip;]<\/p>\n","protected":false},"author":22392,"featured_media":647,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[4,69,54],"class_list":["post-1093","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computerrepair","tag-apple","tag-hackers","tag-ios"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hackers Believe to Steal Ad Revenue on iOS - Computer Repair Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Believe to Steal Ad Revenue on iOS - Computer Repair Blog\" \/>\n<meta property=\"og:description\" content=\"It&#8217;s no known secret that hackers are finding any way possible to insert malicious code to invade privacy and steal important information from potential victims. Synk, a software security business, shared a Chinese mobile ad vulnerability in iOS, implicating they were committing fraud through ads. They stated the following: &#8220;We have identified that mintegral iOS [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/\" \/>\n<meta property=\"og:site_name\" content=\"Computer Repair Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/karlstechnology\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-25T14:46:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-25T14:46:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/09\/My-Post-18.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"629\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kristin Willis\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristin Willis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/\"},\"author\":{\"name\":\"Kristin Willis\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d\"},\"headline\":\"Hackers Believe to Steal Ad Revenue on iOS\",\"datePublished\":\"2020-08-25T14:46:30+00:00\",\"dateModified\":\"2020-08-25T14:46:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/\"},\"wordCount\":261,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/09\/My-Post-18.png\",\"keywords\":[\"Apple\",\"hackers\",\"iOS\"],\"articleSection\":[\"Computer Repair\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/\",\"name\":\"Hackers Believe to Steal Ad Revenue on iOS - Computer Repair Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/09\/My-Post-18.png\",\"datePublished\":\"2020-08-25T14:46:30+00:00\",\"dateModified\":\"2020-08-25T14:46:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/#primaryimage\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/09\/My-Post-18.png\",\"contentUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/09\/My-Post-18.png\",\"width\":1200,\"height\":629},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.karlstechnology.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Believe to Steal Ad Revenue on iOS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#website\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/\",\"name\":\"Computer Repair Blog\",\"description\":\"Karls Technology Computer Repair\",\"publisher\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.karlstechnology.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#organization\",\"name\":\"Karls Technology\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png\",\"contentUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png\",\"width\":800,\"height\":99,\"caption\":\"Karls Technology\"},\"image\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/karlstechnology\",\"https:\/\/x.com\/karlstechnology\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d\",\"name\":\"Kristin Willis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g\",\"caption\":\"Kristin Willis\"},\"sameAs\":[\"https:\/\/www.karlstechnology.com\"],\"url\":\"https:\/\/www.karlstechnology.com\/blog\/author\/kristin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Believe to Steal Ad Revenue on iOS - Computer Repair Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Believe to Steal Ad Revenue on iOS - Computer Repair Blog","og_description":"It&#8217;s no known secret that hackers are finding any way possible to insert malicious code to invade privacy and steal important information from potential victims. Synk, a software security business, shared a Chinese mobile ad vulnerability in iOS, implicating they were committing fraud through ads. They stated the following: &#8220;We have identified that mintegral iOS [&hellip;]","og_url":"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/","og_site_name":"Computer Repair Blog","article_publisher":"https:\/\/www.facebook.com\/karlstechnology","article_published_time":"2020-08-25T14:46:30+00:00","article_modified_time":"2020-08-25T14:46:32+00:00","og_image":[{"width":1200,"height":629,"url":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/09\/My-Post-18.png","type":"image\/png"}],"author":"Kristin Willis","twitter_misc":{"Written by":"Kristin Willis","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/#article","isPartOf":{"@id":"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/"},"author":{"name":"Kristin Willis","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d"},"headline":"Hackers Believe to Steal Ad Revenue on iOS","datePublished":"2020-08-25T14:46:30+00:00","dateModified":"2020-08-25T14:46:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/"},"wordCount":261,"commentCount":0,"publisher":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/#primaryimage"},"thumbnailUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/09\/My-Post-18.png","keywords":["Apple","hackers","iOS"],"articleSection":["Computer Repair"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/","url":"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/","name":"Hackers Believe to Steal Ad Revenue on iOS - Computer Repair Blog","isPartOf":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/#primaryimage"},"image":{"@id":"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/#primaryimage"},"thumbnailUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/09\/My-Post-18.png","datePublished":"2020-08-25T14:46:30+00:00","dateModified":"2020-08-25T14:46:32+00:00","breadcrumb":{"@id":"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/#primaryimage","url":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/09\/My-Post-18.png","contentUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/09\/My-Post-18.png","width":1200,"height":629},{"@type":"BreadcrumbList","@id":"https:\/\/www.karlstechnology.com\/blog\/hackers-believe-to-steal-ad-revenue-on-ios\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.karlstechnology.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackers Believe to Steal Ad Revenue on iOS"}]},{"@type":"WebSite","@id":"https:\/\/www.karlstechnology.com\/blog\/#website","url":"https:\/\/www.karlstechnology.com\/blog\/","name":"Computer Repair Blog","description":"Karls Technology Computer Repair","publisher":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.karlstechnology.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.karlstechnology.com\/blog\/#organization","name":"Karls Technology","url":"https:\/\/www.karlstechnology.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png","contentUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png","width":800,"height":99,"caption":"Karls Technology"},"image":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/karlstechnology","https:\/\/x.com\/karlstechnology"]},{"@type":"Person","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d","name":"Kristin Willis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g","caption":"Kristin Willis"},"sameAs":["https:\/\/www.karlstechnology.com"],"url":"https:\/\/www.karlstechnology.com\/blog\/author\/kristin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts\/1093"}],"collection":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/users\/22392"}],"replies":[{"embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/comments?post=1093"}],"version-history":[{"count":1,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts\/1093\/revisions"}],"predecessor-version":[{"id":1095,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts\/1093\/revisions\/1095"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/media\/647"}],"wp:attachment":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/media?parent=1093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/categories?post=1093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/tags?post=1093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}