• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Source Code of Over 1800 Android and iOS Apps Gives Access to AWS Credentials

You are here: Home / General Cyber Security News / Source Code of Over 1800 Android and iOS Apps Gives Access to AWS Credentials
September 1, 2022

The Symantec Danger Hunter workforce has noticed 1859 applications throughout Android and iOS made up of tough-coded Amazon Web Expert services (AWS) obtain tokens that permitted access to non-public AWS cloud providers.

Of all the apps analyzed by the security researchers, around 50% had been witnessed applying the same AWS tokens identified in other applications (managed by other developers and companies).

“The AWS entry tokens could be traced to a shared library, 3rd-party software program growth package (SDK), or other shared element employed in producing the applications,” reads the advisory, which called the discovery a really serious offer chain vulnerability.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


As for why app developers were being making use of challenging-coded obtain keys, Symantec explained reasons incorporated the necessity of downloading or uploading property and sources necessary for the app (commonly substantial media files), accessing configuration data files for the application, and accessing cloud solutions that have to have authentication.

The security crew also shared findings connected to precise circumstance scientific studies, relevant to an intranet system, various iOS banking applications and an on line gaming technology system respectively. Extra facts about each of them is available here.

The Symantec Threat Hunter team concluded its advisory by providing a collection of recommendations to assistance companies defect versus this type of provide chain issues.

“Adding security scanning remedies to the application development lifecycle and, if utilizing an outsourced supplier, requiring and examining Cellular Application Report Cards, which can identify any unwelcome app behaviors or vulnerabilities for each release of a cell app, can all be helpful in highlighting prospective issues,” wrote the team.

“As an application developer, appear for a report card that equally scans SDKs and frameworks in your software and identifies the resource of any vulnerabilities or undesirable behaviors.”

For context, AWS technologies had been also beneath the highlight before this 12 months when a Turkish airline unintentionally leaked personal information of flight crew along with resource code and flight knowledge owing to a misconfigured AWS bucket.

Far more not long ago, Amazon preset a high-severity vulnerability in its Shots Android app.


Some areas of this short article are sourced from:
www.infosecurity-magazine.com

Previous Post: «how quantum computing could change cyber security How quantum computing could change cyber security
Next Post: Google Chrome Bug Lets Sites Silently Overwrite System Clipboard Content google chrome bug lets sites silently overwrite system clipboard content»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Copyright © TheCyberSecurity.News, All Rights Reserved.