Apple jailbreaking fans know for a fact that the best place to get a reliable crack for their devices is Pangu and not the App Store. But for a fleeting moment, an iOS jailbreak almost pulled a fast one right in Apple’s backyard.
A certain PG client app appeared last weekend on the Apple App Store, something meant for browsing Dribbble. It alleges that it was a better client for the service that allowed aspiring graphics artists to share their work.
Unfortunately, folks who downloaded the app ended up surprised to find the Chinese version of the celebrated iOS 9.3.3 Pangu jailbreak tool that came out in July. This was the semi-tethered version which now recalls that alleged malware package that left some devices compromised at the time.
Is Apple sleeping on the job?
It now becomes a mystery how the iOS jailbreak was able to get through Apple, Apple Insider reported. While approval and publication of new apps underwent an overhaul in May, it will be interesting to see if all this was an oversight or something done through breaches.
The PG Client app went live at 3:30 ET Sunday but Apple was able to disable the download swiftly at 4:00 p.m. ET. There were also able to strike off the webpage for the app leading to the App store.
The whole issue somehow recalls that “Pegasus” issue which was linked to a group called NSO. The group allegedly found ways to take advantage of three security flaws on Apple devices, something that apparently led to the surprise release of iOS 9.3.5. All this was covered via this post.
Apple has yet to issue an official statement though it could lead to stricter monitoring of submitted apps on their end. At present, apps need to wait only 1.95 days to see apps up, a big improvement from the previous wait time. App developers had to wait for nine-days in February 2015 but was whittled down to five-days in December 2015.