Apple Bans Cryptocurrency Miners from the App Store

Apple image

Apple has started restricting the inclusion of cryptocurrency miners from its App Store. The company is doing this in the hope of protecting computer users from malicious instances. The majority of miner code available on these software repositories may be malicious in nature.

Cryptocurrency Miners Are To Be Removed From Apple’s App Store

Apple has updated their App Store guidelines and specifically their Hardware Compatibility to explicitly restrict iOS and Mac apps from performing cryptocurrency operations. This effectively limits the distribution of cryptocurrency miners from the company’s official repository. It is very possible that this has followed up the a popular application called Calendar 2 that bundled a Monero miner in its “premium” version. The application offered the users a choice of using all of the paid features in exchange for the execution of the miner. As a consequence the complex operations can generate revenue that is much bigger that its price and also burden the devices with severe performance issues.

Apple has specifically added a paragraph stating that “Cryptocurrency apps may not offer currency for completing tasks, such as downloading other apps, encouraging other users to download, posting to social networks, etc.”. This means that such behaviour will no longer be tolerated by the company. Google has already prevented cryptocurrency code in the extensions uploaded to the Chrome Web Store without the user’s consent. Other popular web services are also following this attempt at limiting their distribution.

The Danger of Cryptocurrency Miners — the Reasons for Apple’s Ban

Cryptocurrency miners are one of the most popular threats at the moment as they can be concealed in all sorts of payload delivery mechanisms. Their main goal is to utilize the available device resources in order to execute complex (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Martin Beltov. Read the original post at: