{"id":56901,"date":"2024-08-22T14:26:48","date_gmt":"2024-08-22T14:26:48","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/36244\/Novel-Technique-Allows-Malicious-Apps-To-Escape-Walled-Gardens.html"},"modified":"2024-08-22T14:26:48","modified_gmt":"2024-08-22T14:26:48","slug":"novel-technique-allows-malicious-apps-to-escape-walled-gardens","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\/","title":{"rendered":"Novel Technique Allows Malicious Apps To Escape Walled Gardens"},"content":{"rendered":"<figure class=\"intro-image intro-left\"> <img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2023\/05\/phone-malware-800x532.jpg\" alt=\"An image illustrating a phone infected with malware\"><figcaption class=\"caption\">\n<div class=\"caption-credit\">Getty Images<\/div>\n<\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"> <a class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/security\/2024\/08\/novel-technique-allows-malicious-apps-to-escape-ios-and-android-guardrails\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">45<\/span> <\/a> <\/aside>\n<p> <!-- cache hit 161:single\/related:84f0c7aa364fc61676544f8dc5bababc --><!-- empty --><\/p>\n<p>Phishers are using a novel technique to trick iOS and Android users into installing malicious apps that bypass safety guardrails built by both Apple and Google to prevent unauthorized apps.<\/p>\n<p>Both mobile operating systems employ mechanisms designed to help users steer clear of apps that steal their personal information, passwords, or other sensitive data. iOS bars the installation of all apps other than those available in its App Store, an approach widely known as the Walled Garden. Android, meanwhile, is set by default to allow only apps available in Google Play. Sideloading\u2014or the installation of apps from other markets\u2014must be manually allowed, something Google warns against.<\/p>\n<h2>When native apps aren\u2019t<\/h2>\n<p>Phishing campaigns making the rounds over the past nine months are using previously unseen ways to workaround these protections. The objective is to trick targets into installing a malicious app that masquerades as an official one from the targets\u2019 bank. Once installed, the malicious app steals account credentials and sends them to the attacker in real time over Telegram.<\/p>\n<p>\u201cThis technique is noteworthy because it installs a phishing application from a third-party website without the user having to allow third-party app installation,\u201d Jakub Osmani, an analyst with security firm ESET, <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/be-careful-what-you-pwish-for-phishing-in-pwa-applications\/\">wrote Tuesday<\/a>. \u201cFor iOS users, such an action might break any \u2018walled garden\u2019 assumptions about security. On Android, this could result in the silent installation of a special kind of APK, which on further inspection even appears to be installed from the Google Play store.\u201d<\/p>\n<p>The novel method involves enticing targets to install a special type of app known as a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Progressive_web_app\">Progressive Web App<\/a>. These apps rely solely on Web standards to render functionalities that have the feel and behavior of a native app, without the restrictions that come with them. The reliance on Web standards means PWAs, as they\u2019re abbreviated, will in theory work on any platform running a standards-compliant browser, making them work equally well on iOS and Android. Once installed, users can add PWAs to their home screen, giving them a striking similarity to native apps.<\/p>\n<p>While PWAs can apply to both iOS and Android, Osmani&#8217;s post uses PWA to apply to iOS apps and WebAPK to Android apps.<\/p>\n<figure class=\"image shortcode-img center large\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/08\/figure-5-installed-phishing-pwa-left-and-real-banking-app-right.png\" class=\"enlarge\" data-height=\"267\" data-width=\"918\" alt=\"Installed phishing PWA (left) and real banking app (right).\"><img loading=\"lazy\" decoding=\"async\" alt=\"Installed phishing PWA (left) and real banking app (right).\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/08\/figure-5-installed-phishing-pwa-left-and-real-banking-app-right-640x186.png\" width=\"640\" height=\"186\" srcset=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/08\/figure-5-installed-phishing-pwa-left-and-real-banking-app-right.png 2x\"><\/a><figcaption class=\"caption\">\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/08\/figure-5-installed-phishing-pwa-left-and-real-banking-app-right.png\" class=\"enlarge-link\" data-height=\"267\" data-width=\"918\">Enlarge<\/a> <span class=\"sep\">\/<\/span> Installed phishing PWA (left) and real banking app (right).<\/div>\n<\/figcaption><\/figure>\n<figure class=\"image shortcode-img center large\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/08\/figure-7-comparison-between-an-installed-phishing-webapk-left-and-real-banking-app-right.png\" class=\"enlarge\" data-height=\"265\" data-width=\"916\" alt=\"Comparison between an installed phishing WebAPK (left) and real banking app (right).\"><img loading=\"lazy\" decoding=\"async\" alt=\"Comparison between an installed phishing WebAPK (left) and real banking app (right).\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/08\/figure-7-comparison-between-an-installed-phishing-webapk-left-and-real-banking-app-right-640x185.png\" width=\"640\" height=\"185\" srcset=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/08\/figure-7-comparison-between-an-installed-phishing-webapk-left-and-real-banking-app-right.png 2x\"><\/a><figcaption class=\"caption\">\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/08\/figure-7-comparison-between-an-installed-phishing-webapk-left-and-real-banking-app-right.png\" class=\"enlarge-link\" data-height=\"265\" data-width=\"916\">Enlarge<\/a> <span class=\"sep\">\/<\/span> Comparison between an installed phishing WebAPK (left) and real banking app (right).<\/div>\n<\/figcaption><\/figure>\n<p>The attack begins with a message sent either by text message, automated call, or through a malicious ad on Facebook or Instagram. When targets click on the link in the scam message, they open a page that looks similar to the App Store or Google Play.<\/p>\n<figure class=\"image shortcode-img center full\"><img loading=\"lazy\" decoding=\"async\" alt=\"Example of a malicious advertisement used in these campaigns.\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/08\/figure-9-malvertising-captioned.png\" width=\"485\" height=\"449\"><figcaption class=\"caption\">\n<div class=\"caption-text\">Example of a malicious advertisement used in these campaigns.<\/div>\n<\/figcaption><\/figure>\n<figure class=\"image shortcode-img center full\"><img loading=\"lazy\" decoding=\"async\" alt=\"Phishing landing page imitating Google Play.\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/08\/figure-10-phishing-landing-page.png\" width=\"277\" height=\"486\"><figcaption class=\"caption\">\n<div class=\"caption-text\">Phishing landing page imitating Google Play.<\/div>\n<\/figcaption><\/figure>\n<p>ESET\u2019s Osmani continued:<\/p>\n<blockquote>\n<p>From here victims are asked to install a \u201cnew version\u201d of the banking application; an example of this can be seen in Figure 2. Depending on the campaign, clicking on the install\/update button launches the installation of a malicious application from the website, directly on the victim\u2019s phone, either in the form of a<a href=\"https:\/\/web.dev\/articles\/webapks\"> WebAPK<\/a> (for Android users only), or as a PWA for iOS and Android users (if the campaign is not WebAPK based). This crucial installation step bypasses traditional browser warnings of \u201cinstalling unknown apps\u201d: this is the default behavior of Chrome\u2019s WebAPK technology, which is abused by the attackers.<\/p>\n<figure class=\"image shortcode-img center full\"><img loading=\"lazy\" decoding=\"async\" alt=\"Example copycat installation page.\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/08\/figure-2-example-copycat-installation-page.png\" width=\"458\" height=\"839\"><figcaption class=\"caption\">\n<div class=\"caption-text\">Example copycat installation page.<\/div>\n<\/figcaption><\/figure>\n<p>The process is a little different for iOS users, as an animated pop-up instructs victims how to add the phishing PWA to their home screen (see Figure 3). The pop-up copies the look of native iOS prompts. In the end, even iOS users are not warned about adding a potentially harmful app to their phone.<\/p>\n<figure class=\"image shortcode-img center full\"><img loading=\"lazy\" decoding=\"async\" alt=\"Figure 3 iOS pop-up instructions after clicking &quot;Install&quot; (credit: Michal Bl\u00e1ha)\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/08\/figure-3-ios-popup-instructions.png\" width=\"405\" height=\"881\"><figcaption class=\"caption\">\n<div class=\"caption-text\">Figure 3 iOS pop-up instructions after clicking &#8220;Install&#8221; (credit: Michal Bl\u00e1ha)<\/div>\n<\/figcaption><\/figure>\n<p>After installation, victims are prompted to submit their Internet banking credentials to access their account via the new mobile banking app. All submitted information is sent to the attackers\u2019 C&amp;C servers.<\/p>\n<\/blockquote>\n<p>The technique is made all the more effective because application information associated with the WebAPKs will show they were installed from Google Play and have been assigned no system privileges.<\/p>\n<figure class=\"image shortcode-img center full\"><img loading=\"lazy\" decoding=\"async\" alt=\"WebAPK info menu\u2014notice the &quot;No Permissions&quot; at the top and \u201cApp details in store\u201d section at the bottom.\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/08\/figure-14-webapk-infomenu.png\" width=\"539\" height=\"1112\"><figcaption class=\"caption\">\n<div class=\"caption-text\">WebAPK info menu\u2014notice the &#8220;No Permissions&#8221; at the top and \u201cApp details in store\u201d section at the bottom.<\/div>\n<\/figcaption><\/figure>\n<p>So far, ESET is aware of the technique being used against customers of banks mostly in Czechia and less so in Hungary and Georgia. The attacks used two distinct command-and-control infrastructures, an indication that two different threat groups are using the technique.<\/p>\n<p>\u201cWe expect more copycat applications to be created and distributed, since after installation it is difficult to separate the legitimate apps from the phishing ones,\u201d Osmani said.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/36244\/Novel-Technique-Allows-Malicious-Apps-To-Escape-Walled-Gardens.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":56902,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[9081],"class_list":["post-56901","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinephoneflawgoogleapple"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Novel Technique Allows Malicious Apps To Escape Walled Gardens 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Novel Technique Allows Malicious Apps To Escape Walled Gardens 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-22T14:26:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2023\/05\/phone-malware-800x532.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Novel Technique Allows Malicious Apps To Escape Walled Gardens\",\"datePublished\":\"2024-08-22T14:26:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\\\/\"},\"wordCount\":795,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/novel-technique-allows-malicious-apps-to-escape-walled-gardens.jpg\",\"keywords\":[\"headline,phone,flaw,google,apple\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\\\/\",\"name\":\"Novel Technique Allows Malicious Apps To Escape Walled Gardens 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/novel-technique-allows-malicious-apps-to-escape-walled-gardens.jpg\",\"datePublished\":\"2024-08-22T14:26:48+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/novel-technique-allows-malicious-apps-to-escape-walled-gardens.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/novel-technique-allows-malicious-apps-to-escape-walled-gardens.jpg\",\"width\":800,\"height\":532},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,phone,flaw,google,apple\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinephoneflawgoogleapple\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Novel Technique Allows Malicious Apps To Escape Walled Gardens\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Novel Technique Allows Malicious Apps To Escape Walled Gardens 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\/","og_locale":"en_US","og_type":"article","og_title":"Novel Technique Allows Malicious Apps To Escape Walled Gardens 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-08-22T14:26:48+00:00","og_image":[{"url":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2023\/05\/phone-malware-800x532.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Novel Technique Allows Malicious Apps To Escape Walled Gardens","datePublished":"2024-08-22T14:26:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\/"},"wordCount":795,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/08\/novel-technique-allows-malicious-apps-to-escape-walled-gardens.jpg","keywords":["headline,phone,flaw,google,apple"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\/","url":"https:\/\/www.threatshub.org\/blog\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\/","name":"Novel Technique Allows Malicious Apps To Escape Walled Gardens 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/08\/novel-technique-allows-malicious-apps-to-escape-walled-gardens.jpg","datePublished":"2024-08-22T14:26:48+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/08\/novel-technique-allows-malicious-apps-to-escape-walled-gardens.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/08\/novel-technique-allows-malicious-apps-to-escape-walled-gardens.jpg","width":800,"height":532},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/novel-technique-allows-malicious-apps-to-escape-walled-gardens\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,phone,flaw,google,apple","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinephoneflawgoogleapple\/"},{"@type":"ListItem","position":3,"name":"Novel Technique Allows Malicious Apps To Escape Walled Gardens"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56901","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=56901"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56901\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/56902"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=56901"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=56901"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=56901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}