Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
UtiliaCS 970x120
Elon Musk sues Apple for App Store manipulation

Elon Musk sues Apple for App Store manipulation

13 August 2025 19:51

Elon Musk has announced that his company xAI is preparing to sue Apple. The reason is manipulation of App Store rankings, which, he claims, puts OpenAI’s ChatGPT in a more advantageous position than its competitors. According to Musk, this is a direct violation of antitrust laws.

“Apple’s behavior, such that no AI company other than OpenAI has managed to reach the top spot in the App Store, constitutes a clear violation of antitrust rules. We at xAI will take immediate legal action.”

The billionaire has not provided any evidence to support the allegations. Representatives from Apple, OpenAI, and xAI also declined to comment.

ChatGPT currently leads the free apps section of the US iPhone App Store, with xAI’s Grok in fifth place and Google’s Gemini only 57th. The same situation is true on Google Play: on Android, ChatGPT also holds the top spot, according to Sensor Tower.

That said, Apple and OpenAI have a partnership: ChatGPT is already integrated into iOS, iPadOS, and macOS.

This gives it a significant advantage, especially considering the competition for top spots in the app store, where Grok simply can’t compete on equal terms.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.