vshare.com - App Installations that Circumvent Apple's App Store

Emmert
Valued Contributor

http://www.vshare.com/iphone_en.html

A new website has popped up that our students are using to install apps outside of the App Store. I think it's using a combination of profiles and web clips to do this, but I don't have access to a compromised iPad today to investigate more thoroughly.

Is anyone familiar with this?

1 ACCEPTED SOLUTION

roadrunner2348
Contributor

I'm doing a little looking into this, and it looks like it installs a few provisioning profiles as well as the vshare app (as far as I can tell its an app not a webclip). You can then download and install them through that app. I can confirm that blocking the following sites seem to prevent the vshare app from working:

*.vshare.com
*.appvv.com
*.umeng.com

Not too sure how to block the install of the provisioning profile though, or block the vshare app from installing in the first place.

View solution in original post

22 REPLIES 22

roadrunner2348
Contributor

I'm doing a little looking into this, and it looks like it installs a few provisioning profiles as well as the vshare app (as far as I can tell its an app not a webclip). You can then download and install them through that app. I can confirm that blocking the following sites seem to prevent the vshare app from working:

*.vshare.com
*.appvv.com
*.umeng.com

Not too sure how to block the install of the provisioning profile though, or block the vshare app from installing in the first place.

Emmert
Valued Contributor

Swell, I'll block those with our content filter. Thanks!

RWitt
New Contributor II

Has anyone confirmed if the Vshare icon is an app or a webclip? We are blocking apps that aren't in self-service and want to make sure that they have to download the app first to start this loophole?

roadrunner2348
Contributor

The share is NOT a web clip, its an app, and it is not installed via the app store, from what I can tell it gets installed with a provisioning profile. I'm not very familiar with provisioning profiles or their capabilities but I was able to install the share app and apps from the vshare app store on a DEP supervised iPad with the app store completely disabled (both add and remove apps disabled). The best way to block it if your using DEP supervised iPads is to use the Content Filtering config profile and block the above URLS. That should prevent it from being installed no matter what network they're connected to.

-Justin

brandonusher
Contributor II

I too experienced this in my district. It is indeed an App that you can scope a smart group for if you would like to as well. The smart group is how we tracked down each student device that had installed the app and started installing unapproved apps.

Emmert
Valued Contributor

Witt, how are you blocking apps that are not in Self Service? That sounds like a fantastic option for some of our locked-down iPads.

ewu-it
New Contributor III

We have found that this app is pretty much malware. I have students who get this app and subsequently see ads and unsolicited pop-ups injected into Safari on sites that are known to be ad free. It also adds a plugin to Firefox and Chrome to affect them. An example of this behavior are ads that would show up at the bottom of the normally blank Google search page.

A closer inspection found a launch daemon added to load the Vshare app in the background. Once you disable it, kill the Vshare process, and remove the plugin from Firefox and Chrome,the machine no longer presents with these symptoms.

--
Howard Griffith--Endpoint Systems Engineer--Eastern Washington University

davidwbeaty
New Contributor II

@brandonusher What does your smartgroup criteria look like? Is it based on a profile or the app itself? We are just seeing this on campus and I'd like to stop it sooner than later. Thanks.

brandonusher
Contributor II

@davidwbeaty The Smart Group was just criteria of "App Name has vshare2.1.4 or App Name has vShare"

I didn't get the bundle identifier, but that would make it a bit more specific so the name can't change as easy. If you get the identifier (should be like com.vshare.iphone or w/e they use) then the criteria could be "App Identifier is com.vshare.iphone"

lehmanp00
Contributor III

We have a smartgroup that just lists iPads with Provisioning Profiles. I just add new ones as I come across them:

drinkdate <----that's the vShare profile
shanghsa
kutiemie
nanjin
szsc
HiP
EPHiPStore
EPHiPStoreZumDistrib

I have a solid dozen more that are just long numeric numbers.

davidwbeaty
New Contributor II

Thanks so much @brandonusher and @lehmanp00 for reviving this old thread to help me out! I am going to test both types of smartgroup (and going to take the plunge and install vShare on an iPad to see what is going on) I will post if there is anything to add to your criteria. Thanks.

cdenesha
Valued Contributor III

With iOS 9, I have implemented a new Restriction allowed by the MDM Framework, by unchecking 'Allow trusting new enterprise app authors'. They can still install vShare (and it installs its own Provisioning Profile) but they cannot install any of the cracked apps because I don't allow them to get the Trust prompt.

In addition, by trying to find these out in the wild myself, I have determined the following Provisioning Profile names:

profile shanghsa is installed with vShare app
profile guotai is installed with vShare app
profile EPHiPStore is installed with HiPStore app
profile HiP is installed with various apps, like Floppy Cloud and Remote Files
profile com.tence is installed with Shou app
profile 1020 is installed with nds4ios app
profile pggk is installed with PPSSPP app
profile GBA4IOS is installed with GBA4IOS app
profile ZFLDistribution is installed with GBA4IOS app (different site)

However, since there is no need for any of my students to have a Provisioning profile, my SG just reports on 'Provisioning Profile Name' LIKE "".

chris

lehmanp00
Contributor III

I didn't know we could put blank values in SG fields. That jumped my Prov. Profile SG up to 146 ipads.

Thanks cdenesha!

VT-Vincent
New Contributor III

Out of curiosity, what are you doing once you identify iPads with "rogue" provisioning profiles? As I understand it, iOS is supposed to automatically manage them and as such, there is no interface to remove them. Restricting the installation of the profiles via the JSS only affects iOS 9+ and also will not remove any previously installed profiles before that policy was set. The profiles are also backed up in iCloud so the only way we've found to remove them is to wipe the device and set it up as a new iPad.

lehmanp00
Contributor III

Install Xcode and you can remove the profiles that way.

Run Xcode, create a 'project'
Hook up the ipad, trust the computer
Look in the Window menu item in Xcode for a devices option
Select that iOS device
Right-click, show Provision Profiles
Highlight profile and remove.

cdenesha
Valued Contributor III

I've seen very inconsistent results for deleting the app and having the associated Provisioning Profile go away as well.

We've implemented this just this year with grade 7 students, and this is their first year with an iPad, and they have been told up front not to do it.. so we just wipe and reset fresh, no iCloud Restore. Their homework should all be in Google Drive, and it emphasizes that we are not fooling around.

At my previous school I used Xcode like @lehmanp00 described.

chris

VT-Vincent
New Contributor III

@lehmanp00: Very interesting, I didn't know you could remove them via Xcode. I'll have to try it out.

@cdenesha: We're going on our 3rd year of iPads with this year being the middle school's all-grade rollout. We've asked/threatened/banned/pleaded but at the end of the day, we're still dealing with middle school students. :P

I'm not too familiar with how provisioning profiles work, aside from allowing the user to install non-App Store apps, what else can they do? Do they have the ability to push content to the device or manage settings?

cdenesha
Valued Contributor III

We have really good Administrative support for the program.

When you've written your own in-house (Enterprise) app that you want to deploy outside the App Store, you have to install your Provisioning Profile along with it. It is being abused out in the wild.

zsmith
New Contributor

@lehmanp00

Thanks for your suggestion about the Smartgroup that would sense provision profiles.

What criteria did you use to set this SG up exactly? I'm having trouble finding anything other than "Provision Profile Name". Unless that's the one.

If you could share how you have it configured - that would be much appreciated!

cdenesha
Valued Contributor III

@zsmith yes that is the one, and you leave the Value field blank.

2c37a10dce2e47d7b1c53936e268c1cd

torres14
New Contributor

Do you have any idea on vshare pro app. the latest version of vshare app. http://vshareprodownload.com

VT-Vincent
New Contributor III

Unchecking the "Allow trusting new enterprise app authors" restriction should put the kibosh on any of the rogue apps described here, providing the user is on iOS 9+

Unless I'm missing something, it looks like the "new" vShare is just a web clip. I don't think you can restrict creating new web clips short of blacklisting the original URL.