Breaking News
Positive Technologies: Half of mobile banks are vulnerable to theft of funds through mobile app flaws
Positive Technologies has released its latest report, Vulnerabilities and Threats in Mobile Banking. Experts analyzed mobile banking applications and found half of mobile banks are vulnerable to fraud and theft of funds, with the server side accounting for more than half of all detected vulnerabilities.
None of the tested mobile banking applications had an acceptable level of security, with both client and server sides at risk. Client sides are especially vulnerable to unauthorized access to user data, as 43 percent of applications store important data on the phone in cleartext. The vast majority (76 percent) of mobile banking vulnerabilities can be exploited without physical access to the device. And more than a third of vulnerabilities can be exploited without administrator rights.
No flaws in iOS banking apps were worse than “medium” in severity. By comparison, 29 percent of Android apps contain high-risk vulnerabilities. The most dangerous vulnerabilities were found in Android applications and involve insecure deeplink handling. Developers on Android have more freedom of implementation, which explains the larger number of vulnerabilities in Android applications compared to iOS.
The server sides of mobile banking applications contain 54 percent of all vulnerabilities found and, on average, each mobile bank has 23 server side vulnerabilities. Almost half (43%) of banking applications contain server-side vulnerabilities in business logic, which attackers can exploit to obtain sensitive user information and commit fraud. Business logic errors may cause significant losses to banks and even lead to legal complications.
User credentials proved to be the most vulnerable data.
Positive Technologies analyst Olga Zinenko commented: “Banks are not protected from reverse engineering of their mobile apps. Moreover, they give short shrift to source code protection, store sensitive data on mobile devices in cleartext, and make errors allowing hackers to bypass authentication and authorization mechanisms and bruteforce user credentials. Through these vulnerabilities, hackers can obtain usernames, account balances, transfer confirmations, card limits, and the phone number associated with a victim’s card.”
“We urge that banks do a better job of emphasizing application security throughout both design and development. Source code is rife with issues, making it vital to revisit development approaches by implementing SSDL practices and ensuring security at all stages of the application lifecycle.”
In 87 percent of cases, user interaction is required for a vulnerability to be exploited. Positive Technologies experts recommend that users avoid jailbreaking or rooting their devices, download applications only from official stores, avoid visiting suspicious websites or following dodgy links from SMS and chat messages, and always install the latest updates for OS and mobile applications.
You can download the full report, Vulnerabilities and Threats in Mobile Banking, here.
- Second Day of Money20/20 Middle East Unveils Next-Gen Solutions at the Region’s Largest Ever Fintech Gathering Read more
- United Gulf Financial Services Joins The Hashgraph Association and Exponential Science Foundation Adding $1M to Hedera Africa Hackathon Pool Prize Read more
- Payhawk Transforms Spending Experience for Businesses With Four Enterprise-Ready AI Agents Read more
- Alipay+ to Launch in Saudi Arabia, Facilitating Cross-Border Mobile Payments for Local Merchants Read more
- Saudi Central Bank Launches Google Pay Service Through Mada Network Read more