Mobile banking apps are holding data insecurely

“Systemic problems” could allow an attacker to manipulate data, take over accounts and commit fraud

Woman's hand on a smartphone showing a mobile banking app

Research into a host of mobile banking apps has revealed alarming security fallibilities that could pave the way for cyber criminals to access highly sensitive financial data.

Systemic problems in the financial sector's approach to designing security into mobile banking applications have left glaring holes, spanning from weak encryption standards to data leakage.

Researchers on behalf of Arxan Technologies highlighted 11 types of vulnerability found across 30 Android apps from all flavours of financial institutions across Europe and the US, with a total of 180 critical vulnerabilities discovered.

These, if exploited by an attacker, could lead to identity theft, and account fraud, among other dire consequences.

"When a company fails to implement proper application security technology for its app, it opens up the app to be easily reverse-engineered, potentially leading to account takeovers, data spills, and fraud," said researcher Alissa Valentina Knight.

"As a result, the company could experience significant financial losses and damage to brand, customer loyalty, and shareholder confidence as well as government penalties.

"While the findings in this report are specific to these companies, many of them are systemic across all of the mobile apps tested, and other types of companies should use them as a guide for securing their mobile apps."

The names of the banking apps in which vulnerabilities were detected have were redacted, presumably for fear that these companies will subsequently be targeted by malicious actors.

Retail banking apps were found to harbour the greatest number of critical vulnerabilities, while US-based health savings account (HSA) companies were the least exploitable. Also, to the researcher's surprise, smaller companies had the most secure development hygiene, while larger companies produced the most vulnerable apps.

The most common vulnerability type was a lack of binary protections, with 97% of apps tested being possible to decompile and review the source code. Moreover, all apps tested failed to implement application security to obfuscate the source code.

Meanwhile, 90% of applications tested engaged in unintended data leakage, with data from the mobile banking app inadvertently made available to other apps on a user's device. This, for instance, could lead an attack to harvest financial data through other apps they have control over on a device.

Additionally, 80% of apps implemented weak encryption algorithms or the incorrect implementation of a strong cipher. Adversaries could, by exploiting this, decrypt sensitive data into its original form and either manipulate or sell this on.

The most worrying finding, however, was that 83% of apps tested stored users' sensitive data insecurely in the first place. Financial data was stored outside of a sandbox and in the device's local file system, external storage, or even copied to the clipboard, according to Knight.

To remedy these issues, she recommended that financial companies adopt a comprehensive approach to security, and employ a number of technologies such as app shielding, encryption and threat analytics.

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

Lazarus APT hacking group is targeting the defense industry
Security

Lazarus APT hacking group is targeting the defense industry

26 Feb 2021
Microsoft open sources CodeQL queries used in Solorigate inquiry
Security

Microsoft open sources CodeQL queries used in Solorigate inquiry

26 Feb 2021
CISA warns of ongoing Accellion File Transfer Appliance attacks
hacking

CISA warns of ongoing Accellion File Transfer Appliance attacks

25 Feb 2021
What is a Trojan?
Security

What is a Trojan?

25 Feb 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
How to use Chromecast without Wi-Fi
Mobile

How to use Chromecast without Wi-Fi

26 Feb 2021