Cyber Security News

43% of Top 100 Enterprise Mobile Apps Expose Sensitive Data to Hackers

A comprehensive study by zLabs, the research team at Zimperium, has found that over 43% of the top 100 mobile applications used in business environments contain severe vulnerabilities that expose sensitive data to potential hackers.

This finding underscores the urgent need for enterprises to reassess their app vetting processes and enhance security measures to protect against data leaks and breaches.

Data breaches have seen an unprecedented rise in 2024, with over 1.7 billion individuals affected globally, marking a 312% increase from the previous year.

The financial implications are equally staggering, with losses estimated at $280 billion.

Much of this vulnerability can be attributed to the rise in mobile device usage within corporate networks, especially under Bring Your Own Device (BYOD) policies, which exacerbate the risks associated with mobile apps on both Android and iOS platforms.

Cloud Configuration and Security Risks

The study analyzed 54,648 work-related apps, scrutinizing their integration with cloud services, which have become integral to mobile app functionality due to their scalability and convenience. However, this integration has a flip side.

Approximately 62% of all apps utilize cloud APIs or SDKs, yet this connectivity often exposes data through misconfigured cloud storage settings.

Data saved in an unprotected or misconfigured cloud storage can be accessed by anyone.

Over 100 Android apps were identified as using unprotected or poorly configured cloud storage, with some even ranking among the top 1000 in the Google Play Store.

This misconfiguration allows unauthorized global access to potentially sensitive information, rendering data uselessly exposed.

In some instances, exposed credentials to services like AWS were found, opening pathways for data tampering or ransomware attacks without traditional security breaches.

The critical nature of these vulnerabilities was highlighted by a recent incident involving a major car manufacturer, where a misconfigured cloud environment led to a significant breach affecting hundreds of thousands of customers.

Hardcoded cloud credentials make data vulnerable to breaches and tampering

Cryptographic Vulnerabilities Undermining Data Integrity

Encryption, a fundamental pillar of data security, was also found lacking in many enterprise apps.

Despite its importance, 88% of all apps and 43% of the top 100 apps either employ weak cryptographic methods or fail to follow best practices:

  • Hard-coded cryptographic keys, a severe security flaw, were prevalent, offering potential hackers a straightforward path to decrypting sensitive data.
  • The use of outdated encryption algorithms like MD2 and insecure random number generators further compound the security risks, providing opportunities for attackers to exploit encrypted data both in transit and at rest.

The implications of these findings are profound:

  • Data Exposure: Misconfigurations in cloud storage settings can lead to immediate breaches, exposing corporate data to the world.
  • Regulatory Non-Compliance: Such vulnerabilities often violate data protection regulations like GDPR, HIPAA, and standards such as MASVS, exposing companies to significant legal and financial repercussions.
  • Financial Risks: The average cost of a data breach is approximately $4.88 million, with cloud misconfigurations and compromised credentials being the primary vectors for cyberattacks.

To mitigate these risks, enterprises must:

  • Implement strict control over app behavior, focusing on cloud security settings, cryptographic key management, and the security of third-party integrations.
  • Conduct regular audits and assessments of their mobile app fleets to ensure compliance with security best practices.
  • Enhance employee awareness regarding BYOD security implications and manage their devices to prevent accidental data leaks.

As mobile devices continue to serve as gateways to sensitive corporate data, the imperative for robust security practices has never been clearer.

Enterprises must pivot towards proactive security measures to safeguard their digital assets against the escalating threats in today’s mobile-centric business landscape.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new modules,…

2 hours ago

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an innovative…

3 hours ago

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image files…

4 hours ago

Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access

A sophisticated and highly coordinated cyberattack campaign came to light, as tracked by Guardz Research.…

4 hours ago

Hackers Abuse Copilot AI in SharePoint to Steal Passwords and Sensitive Data

Microsoft’s Copilot for SharePoint, designed to streamline enterprise collaboration through generative AI, has become an…

4 hours ago

Defendnot: A Tool That Disables Windows Defender by Registering as Antivirus

Cybersecurity developers have released a new tool called "defendnot," a successor to the previously DMCA-takedown-affected…

4 hours ago