Of Special Interest


[x] [x]

9th April 2019

FS is putting consumer data at risk by failing to protect mobile apps, says Arxan

Arxan Technologies has announced the findings of a new research report, which reveals widespread security inadequacies and protection failures among consumer financial applications, leading to the exposure of source code, sensitive data stored in apps, access to back-end servers via APIs, and more.

Senior cybersecurity analyst Alissa Knight of research and advisory firm Aite Group authored the study, entitled “In plain sight: The vulnerability epidemic in financial services mobile apps”. Ms Knight examined the mobile apps of 30 financial institutions (FIs) downloaded from the Google Play store across eight financial services sectors.

Using tools readily available on the internet, she found nearly all of the applications could easily be reverse engineered allowing access to sensitive information stored inside the source code. The research highlights a systemic lack of application appropriate protection such as application shielding, threat detection, encryption, and response technology across financial services apps.

Key findings from the research include:
• Lack of Binary Protections — 97 per cent of all apps tested lacked binary code protection, making it possible to reverse engineer or decompile the apps exposing source code to analysis and tampering
• Unintended Data Leakage — 90 per cent of the apps tested shared services with other applications on the device, leaving data from the FI’s app accessible to any other application on the device
• Insecure Data Storage — 83 per cent of the apps tested insecurely stored data outside of the apps control, for example, in a device’s local file system, external storage, and copied data to the clipboard allowing shared access with other apps; and, exposed a new attack surface via APIs
• Weak Encryption — 80 per cent of the apps tested implemented weak encryption algorithms or the incorrect implementation of a strong cipher, allowing adversaries to decrypt sensitive data and manipulate or steal it as needed
• Insecure Random-Number Generation — 70 per cent of the apps use an insecure random-number generator, a security measure that relies on random values to restrict access to a sensitive resource, making the values easily guessed and hackable

“During this research project, it took me 8.5 minutes on average to crack into an application and begin to freely read the underlying code, identify APIs, read file names, access sensitive data and more. With FIs holding such sensitive financial and personal data — and operating in such stringent regulatory environments — it is shocking to see just how many of their applications lack basic secure coding practices and app security protections,” said Ms Knight.

“The large number of vulnerabilities exposed from decompiling these applications poses a direct threat to financial institutions and their customers. These resulting threats ranged from account takeovers, credit application fraud, synthetic identity fraud, identity theft and more. It’s clear from the findings that the industry needs to address the vulnerability epidemic throughout its mobile apps and employ a defence-in-depth approach to securing mobile applications — starting with app protection, threat detection and encryption capabilities implemented at the code level.”

To download the full research report, visit: https://www.arxan.com/resources/downloads/aite-research-financial-mobile-apps