• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Thousands of Mobile Apps Expose User Data Via Cloud Misconfigurations

You are here: Home / General Cyber Security News / Thousands of Mobile Apps Expose User Data Via Cloud Misconfigurations
March 16, 2022

Mobile applications with tens of tens of millions of downloads are leaking sensitive user data thanks to the misconfiguration of again-end cloud databases, according to Check Level.

The security vendor’s three-thirty day period analyze began with a very simple query on VirusTotal for cell apps outlined on the malware scanning assistance that communicates with the Firebase cloud database.

Through the research, Verify Place found out 2113 cellular applications in this way that had their Firebase back-finish uncovered due to misconfigurations.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“While creating code, builders devote a ton of sources to harden an application towards various forms of attacks. However, builders may possibly neglect configuring the cloud database effectively hence leaving genuine-time databases exposed, which could then result in a catastrophic breach if exploited,” the security vendor warned.

“Developers often manually improve the default locked and secured configurations of security policies to operate assessments. If remaining unlocked and unprotected just before releasing the application to manufacturing it leaves the databases open to any individual accessing it and hence prone to go through and produce into the databases.”

Verify Point highlighted many culprits it found out in this way. One was a South American e-commerce app with about 10 million downloads leaking API gateway credentials and API keys. An additional was a brand design app, also with extra than 10 million downloads, which exposed 130,000 usernames, email messages and passwords.

Also detailed had been a social audio system with more than five million downloads exposing lender specifics, site, phone figures and chat messages, and a well-known bookkeeping app leaking 280,000 phone numbers linked to at the very least 80,000 enterprise names, addresses, lender balances, funds balances, bill counts and e-mails.

Test Stage even identified a person dating app leaking 50,000 personal messages sent by end users.

“The wide variety of feasible attacks is matter to the form of uncovered knowledge. It is a bottomless pit of options ranging from fraud, identity theft to ransomware or even provide chain attacks,” Look at Stage concluded.

“Cloud misconfigurations are the consequences of deficiency of consciousness, suitable policies and security coaching that are more heightened and desired with the new get the job done from house hybrid product. Terrible security techniques can trigger comprehensive injury, and are nevertheless only one particular straightforward simply click away from staying remediated.”

The conclusions chime with a different analyze out this week which uncovered that 14% of Android and iOS applications using community cloud back again-finishes experienced misconfigurations that uncovered users’ personalized info.


Some sections of this post are sourced from:
www.infosecurity-journal.com

Previous Post: «nsw ditches e voting system for 2023 election NSW ditches e-voting system for 2023 election
Next Post: NortonLifeLock and Avast merger could reduce competition, CMA warns nortonlifelock and avast merger could reduce competition, cma warns»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Russian Turla Hackers Hijack Decade-Old Malware Infrastructure to Deploy New Backdoors
  • WhatsApp Unveils Proxy Support to Tackle Internet Censorship
  • Hackers Using CAPTCHA Bypass Tactics in Freejacking Campaign on GitHub
  • Blind Eagle Hacking Group Targets South America With New Tools
  • US Family Planning Non-Profit MFHS Confirms Ransomware Attack
  • Microsoft Reveals Tactics Used by 4 Ransomware Families Targeting macOS
  • Dridex Malware Now Attacking macOS Systems with Novel Infection Method
  • Cyber attacks on UK organisations surged 77% in 2022, new research finds
  • WhatsApp to combat internet blackouts with proxy server support
  • The IT Pro Podcast: Going passwordless

Copyright © TheCyberSecurity.News, All Rights Reserved.