An attacker can hide amidst legitimate traffic in the application’s update function.
Source: Threadpost