• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
misconfigurations may have exposed data on 100 million android users

Misconfigurations may have exposed data on 100 million Android users

You are here: Home / General Cyber Security News / Misconfigurations may have exposed data on 100 million Android users
May 21, 2021

<> on March 2, 2010 in Hannover, Germany.

Scientists on Thursday reported that in examining Android apps on open up databases they identified critical cloud misconfigurations that led to the potential exposure of knowledge belonging to far more than 100 million consumers.

In a blog put up, CheckPoint Study discussed how the misuse of a real-time databases, notification administrators, and storage uncovered the own knowledge of end users, leaving company resources vulnerable to negative menace actors.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“By not pursuing best procedures when configuring and integrating 3rd-party cloud providers into programs, tens of millions of users’ non-public knowledge was uncovered,” the scientists stated. “In some conditions, this form of misuse only impacts the customers, however, the developers ended up also left susceptible. The misconfiguration place users’ personalized knowledge and developer’s inner resources, this kind of as access to update mechanisms and storage at risk.”

Even though investigating content material on the Google Play open real-time databases, the scientists recovered a good deal of delicate information and facts, like email addresses, passwords, non-public chats, unit spot, and consumer identifiers. The scientists explained if a destructive actor acquired entry this facts it could outcome in fraud and identity theft. Astro Guru, a preferred astrology application with far more than 10 million downloads had the very same issue. 

For some of the Android applications that CheckPoint examined, builders were embedding link keys for again-stop cloud storage immediately into the cell software code, reported Michael Isbitski, complex evangelist at Salt Security. He explained it’s a bad apply to hardcode and retail store static access keys into an application, which the app in change uses to connect to an organization’s individual backend APIs and 3rd-party cloud APIs.

“Compiled code inside of cell app binaries are substantially additional readable than quite a few builders recognize,” Isbitski reported. “Decompilers and disassemblers are plentiful, and these kinds of link keys are effortlessly harvested by attackers. Attackers then bypass the application solely and connect specifically to back-conclusion APIs to abuse the business logic of the application or scrape facts.”

Stephen Banda, senior manager, security methods at Lookout, reported to deploy code promptly, corporations rely on automatic software shipping procedures to update performance and implement security patches to continue to keep cloud apps up-to-day. He reported moving at this speed, even with seem adjust management and security most effective practices in spot usually means every single firm operates the risk of introducing misconfigurations into their cloud purposes. 

“Human aspects, this sort of as human error, cloud information gaps, and lack of security consciousness very best procedures, carry on to be the dominating factor in introducing misconfigurations,” Banda reported. “These misconfigurations existing vulnerabilities that cyber attackers can exploit, finally placing shopper knowledge at risk.”

Salt Security’s Isbitski additional that builders who use cloud storage have to leverage the cloud provider’s accessibility manage and encryption mechanisms to retain the knowledge shielded. He claimed cellular app developers should make use of the Android Keystore and Keychain mechanisms that are backed by the hardware security module of the cellular gadget. Developers should also make use of the Android encryption mechanisms when storing other sensitive facts consumer-facet.


Some sections of this short article are sourced from:
www.scmagazine.com

Previous Post: «Cyber Security News #RSAC: The Most Dangerous New Attack Techniques
Next Post: Microsoft Warns of Data Stealing Malware That Pretends to Be Ransomware microsoft warns of data stealing malware that pretends to be»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.