• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Cloud Misconfiguration Exposes 100M+ Android Users

You are here: Home / General Cyber Security News / Cloud Misconfiguration Exposes 100M+ Android Users
May 21, 2021

Misconfiguration of again-conclude cloud companies by more than 20 cellular app builders may perhaps have uncovered the particular info of in excess of 100 million Android buyers, in accordance to scientists.

A team at Verify Point investigated 23 Android purposes in a new piece of investigate, and uncovered users’ email messages, chat messages, spot, passwords and photos all exposed by bad security methods.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


There have been three principal issues. First, misconfiguration of the real-time databases that developers use to retailer info in the cloud and synchronize it with each customer instantaneously.

In 13 of the apps analyzed, no authentication was deployed, enabling would-be attackers to entry hugely delicate person information these kinds of as email addresses, passwords and private chats.

The next security snafu regarded thrust notification manager services.

“Most thrust notification services involve a important (occasionally, more than 1) to identify the identity of the request submitter,” Check Level spelled out. “When all those keys are just embedded into the software file alone, it is really straightforward for hackers to get regulate and get the potential to mail notifications which may possibly contain malicious back links or material to all buyers on behalf of the developer.”

The 3rd issue was with cloud storage: again the scientists had been equipped to obtain instances exactly where developers experienced stored keys in the app file by itself, enabling attackers to access delicate user data.

Check Stage reported some, but not all, of the developers it contacted prior to publication had changed their configurations to mitigate the highlighted issues.

“This is the great storm of three issues — cloud misconfigurations, cloud credential leaks, and overly permissive cell applications collecting more individual facts than required. Cellular applications generally rely on general public cloud-centered backend solutions like databases, analytics, and storage which are primary candidates for misconfiguration,” argued Saumitra Das, CTO of Blue Hexagon.

“Additionally, they launch their code overtly on application stores creating it a lot easier for folks to reverse engineer the inner workings. It is a popular blunder to leave cloud entry keys in code repositories and apps. Uncomplicated encodings like base64 are not sufficient to obscure the obtain keys which can allow everyone to then get entry to shopper PII currently being gathered by the app in the cloud.”


Some components of this short article are sourced from:
www.infosecurity-magazine.com

Previous Post: «microsoft warns of data stealing malware that pretends to be Microsoft Warns of Data Stealing Malware That Pretends to Be Ransomware
Next Post: Report Shows Global CISOs Failing to Practice What They Preach Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.