How Android developers can protect their apps from IAP hackers

This guide is for Android app developers who earn income from IAPs, and want to protect themselves from hackers and fraudulent purchases via hacking tools. There are several well-known IAP hacking tools out there, which I will not list here, but basically these tools send false purchase receipts to your app to allow the user to enjoy free IAPs. This can be anything from monthly subscriptions to in-game tokens.

While new versions of these hacking tools are always being released, and diligence in staying aware of their latest updates and methods is very important, there are a few things you can to do protect your apps IAPs from being stolen. Most notably, you need to enable several methods of server-side IAP verification, which I will detail below.

This guide is not intended for newbies, but experienced app developers who will understand the various lingo in this guide.

Using a Git Repo Plug-in Specifically for this purpose:

PiracyChecker

Add the repository to your project build.gradle:

repositories {

maven {

url “https://jitpack.io”

}

}

And add the library to your module build.gradle:

dependencies {

compile ‘com.github.javiersantos:PiracyChecker:1.1’

}

Recommendations

  • Always enable ProGuard in your production releases.
  • PiracyChecker should be included in your onCreate method in order to check for a valid license as soon as possible.
  • It’s recommended to show a new Activity instead of a Dialog when the license is not valid. This way you make sure that the main activity of the app is finished. See “Display results in a Dialog or a new Activity“.

Verify Google Play Licensing (LVL)

Google Play offers a licensing service that lets you enforce licensing policies for applications that you publish on Google Play. With Google Play Licensing, your application can query Google Play to obtain the licensing status for the current user.

Any application that you publish through Google Play can use the Google Play Licensing service. No special account or registration is needed.

new PiracyChecker(this)

.enableGooglePlayLicensing(“BASE_64_LICENSE_KEY”)

.start();

In order to retrieve your BASE64 license key your app must be uploaded to the Google Play Developer Console. Then access to your app -> Services and APIs.

When using Google Play Licensing your should call .destroy() in the onDestroy() method of your Activity to avoid multiple instances of the service running.

Verify your app’s signing certificate (signature)

Developers must always sign applications with their private key/certificate (contained in a .keystore file) before the app can be installed on user devices. The signing certificate must stay consistent throughout the life of the app, and typically have an expiry date of 25 years.

The app signature will be broken if the .apk is altered in any way — unsigned apps cannot typically be installed. We can imagine an attacker removing license-checking code to enable full app features without paying, for instance. A more dangerous example would be altering the .apk to include malware in a legitimate app to harvest sensitive user data. In order for the altered .apk to be installed, the attacker must resign it.

new PiracyChecker(this)

.enableSigningCertificate(“478yYkKAQF+KST8y4ATKvHkYibo=”) // The original APK signature for the PRODUCTION version

.start();

BE CAREFUL!! Your app signature can be retrieved using a PiracyCheckerUtils method. Make sure that you have signed your APK using your PRODUCTION keystore (not using the DEBUG one) and installed the version that you plan to distribute. Then copy the signature returned by this method on the console and paste in .enableSigningCertificate(“YOUR_APK_SIGNATURE”)

// This method will print your app signature in the console

Log.e(“SIGNATURE”, PiracyCheckerUtils.getAPKSignature(this));

Verify the installer

If you only plan to distribute the app on a particular store this technique will block from installing the app using any another store.

Supported stores: Google Play, Amazon App Store and Samsung Galaxy Apps.

new PiracyChecker(this)

.enableInstallerId(InstallerID.GOOGLE_PLAY)

.enableInstallerId(InstallerID.AMAZON_APP_STORE)

.enableInstallerId(InstallerID.GALAXY_APPS)

.start();

BE CAREFUL!! This is a really restrictive technique since it will block your app from being installed using another market or directly installing the .apk on the device. It isn’t recommended for most cases.

Verify the use of pirate apps

If you want to check if user has pirate apps installed, you can use this code.

It will check for: Lucky Patcher, Uret Patcher, Freedom and CreeHack.

new PiracyChecker(this)

.enableUnauthorizedAppsCheck()

.start();

You can block the app even when this pirate apps has been uninstalled. This prevents the app from being patched and then uninstall the pirate app in order to continue using your app. The library will save a SharedPreference value to know when a pirate app has been detected.

There are two ways to do this:

Define the SharedPreferences and the name of the preference where you want to save the result.

new PiracyChecker(this)

.enableUnauthorizedAppsCheck()

.blockIfUnauthorizedAppUninstalled(preferences, “app_unauthorized”) // Change “app_unauthorized” with your own value

.start();

Define the SharedPreferences name and the name of the preference where you want to save the result.

new PiracyChecker(this)

.enableUnauthorizedAppsCheck()

.blockIfUnauthorizedAppUninstalled(“license_preferences”, “app_unauthorized”) // Change “license_preferences” and “app_unauthorized” with your own value

.start();

Verify the use of third-party store apps

If you want to check if user has third-party store apps installed, you can use this code.

It will check for: Aptoide, BlackMart, Mobogenie, 1Mobile, GetApk, GetJar, SlideMe and ACMarket.

new PiracyChecker(this)

.enableStoresCheck()

.start();

Verify if app is a debug build

If your app is running on an emulator outside the development process, it gives an indication that someone other than you is trying to analyze the app.

new PiracyChecker(this)

.enableDebugCheck()

.start();

Verify if app is being run in an emulator

Outside of development, it’s unlikely that your app should be running on an emulator, and releasing apps with debuggable enabled is discouraged as it allows connected computers to access and debug the app via the Android Debug Bridge.

boolean deep = false;

new PiracyChecker(this)

.enableEmulatorCheck(deep)

.start();

Note: the deep boolean with make the library do extra checks to detect if device is an emulator or not. It could lead to some weird crashes, so be wise when using it.

Save the result of the license check in SharedPreferences

Saving the result of the license check is useful for checking the license status without calling .start() multiple times.

There are two ways to do this:

Define the SharedPreferences and the name of the preference where you want to save the result.

new PiracyChecker(this)

.saveResultToSharedPreferences(preferences, “valid_license”) // Change “valid_license” with your own value

.start();

Define the SharedPreferences name and the name of the preference where you want to save the result.

new PiracyChecker(this)

.saveResultToSharedPreferences(“license_preferences”, “valid_license”) // Change “license_preferences” and “valid_license” with your own value

.start();

Customizations

Display results in a Dialog or a new Activity

It’s recommended to show a new Activity instead of a Dialog when the license is not valid. This way you make sure that the main activity of the app is finished.

By default a non-cancelable Dialog will be displayed.

new PiracyChecker(this)

.display(Display.ACTIVITY)

.start();

By default, the displayed Activity will use the library colors. To apply a custom primary and primary dark color, and to define if the activity should show normal or light status bar, use:

.withActivityColors(R.color.colorPrimary, R.color.colorPrimaryDark, withLightStatusBar)

You can also define a custom layout xml for this activity content, using:

.withActivityLayout(R.layout.my_custom_layout)

Using custom callbacks

Adding a callback to the builder allows you to customize what will happen when the license has been checked and manage the license check errors if the user is not allowed to use the app. Keep in mind that when using this method you must be aware of blocking the app from unauthorized users.

By default, the library will display a non-cancelable dialog if the user is not allowed to use the app, otherwise nothing will happen.

Use the builder and add following:

.callback(new PiracyCheckerCallback() {

@Override

public void allow() {

// Do something when the user is allowed to use the app

}

 

@Override

public void dontAllow(@NonNull PiracyCheckerError error, @Nullable PirateApp app) {

// You can either do something specific when the user is not allowed to use the app

// Or manage the error, using the ‘error’ parameter, yourself (Check errors at {@link PiracyCheckerError}).

 

// Additionally, if you enabled the check of pirate apps and/or third-party stores, the ‘app’ param

// is the app that has been detected on device. App can be null, and when null, it means no pirate app or store was found,

// or you disabled the check for those apps.

// This allows you to let users know the possible reasons why license is been invalid.

}

 

@Override

public void onError(@NonNull PiracyCheckerError error) {

// This method is not required to be implemented/overriden but…

// You can either do something specific when an error occurs while checking the license,

// Or manage the error, using the ‘error’ parameter, yourself (Check errors at {@link PiracyCheckerError}).

}

})

ABOUT THE AUTHOR

Kevin Arrows


Kevin Arrows is a highly experienced and knowledgeable technology specialist with over a decade of industry experience. He holds a Microsoft Certified Technology Specialist (MCTS) certification and has a deep passion for staying up-to-date on the latest tech developments. Kevin has written extensively on a wide range of tech-related topics, showcasing his expertise and knowledge in areas such as software development, cybersecurity, and cloud computing. His contributions to the tech field have been widely recognized and respected by his peers, and he is highly regarded for his ability to explain complex technical concepts in a clear and concise manner.