Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

10/23/2017
05:43 PM
50%
50%

Unpatched Bugs Rampant on Mobile Devices in Financial Services Firms

More than a quarter of mobile devices used by financial services employees carry known vulnerabilities, according to a recent report.

Many financial services employees are toting around unpatched mobile devices, putting their companies and customers at risk of a data breach, a recent report found.

More than 25% of mobile devices used by financial services employees had unpatched vulnerabilities, according to Symantec's Q2 2017 Mobile Threat Intelligence Report: Mobility and Finance.

The data, gleaned from Symantec's endpoint mobile security software and other sources, also found that 15% of employees' mobile devices at financial services institutions had been exposed to a malicious network, while three in every thousand devices were infected with malware.

"If I read this report and I was Procter & Gamble, I would be asking my bank, what you are doing to protect my data when your executives are connecting to suspicious WiFi networks, or how many of your employees have phones with malware?" says Varun Kohli, a senior director at Symantec. "I would be asking these questions because my data is at risk."

And although corporate customers may find there is little they can do to protect themselves from the actions - or lack of actions - that their financial services company is taking, Kohli says that may change in the future.

"I hear enterprises are asking their software vendors to take certain steps to protect their information, but I have not heard this of the banks," Kohli says. "But companies need to also ask this of their business partners, too."

Patching Problem

Although Apple and Google may regularly patch vulnerabilities, employees at financial institutions may be unaware of the patch notifications. In part, Apple is able to push its patches out relatively easily since it controls both the hardware and software, whereas the task is more challenging for Android.

When Google issues a patch, it has to be delivered to the device manufacturer, which then performs its own version of the update if it decides to issue a patch for the flaw at all, Kohli says. 

Other findings in the report include a general lack of good mobile security hygiene. For example, more than 13% of mobile devices used by financial services employees lack the latest major OS version, while 99% do not have the latest minor update issued by Google or Apple, the report found.

Some 4.6% of iOS users in this sector have yet to install the latest mobile operating system, compared to 47.8% for Android, according to the report.

Despite those results, the financial services industry as well as the healthcare sector tend to institute more frequent updates than all industries overall, Kohli says. He notes both industries suffer the most attacks because of their valuable information and data and, as a result, more is spent to secure those industries and the devices they use.

"They are early adopters of security; but even then, we are seeing problems," Kohli says. "I was very surprised at the results. I would have expected the number in the financial services industry to be lower."

Related Content:

 

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Active Directory Needs an Update: Here's Why
Raz Rafaeli, CEO and Co-Founder at Secret Double Octopus,  1/16/2020
Google Lets iPhone Users Turn Device into Security Key
Kelly Sheridan, Staff Editor, Dark Reading,  1/15/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-16270
PUBLISHED: 2020-01-22
Samsung Galaxy Gear series before build RE2 includes the hcidump utility with no privilege or permission restriction. This allows an unprivileged process to dump Bluetooth HCI packets to an arbitrary file path.
CVE-2018-16271
PUBLISHED: 2020-01-22
The wemail_consumer_service (from the built-in application wemail) in Samsung Galaxy Gear series allows an unprivileged process to manipulate a user's mailbox, due to improper D-Bus security policy configurations. An arbitrary email can also be sent from the mailbox via the paired smartphone. This a...
CVE-2018-16272
PUBLISHED: 2020-01-22
The wpa_supplicant system service in Samsung Galaxy Gear series allows an unprivileged process to fully control the Wi-Fi interface, due to the lack of its D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
CVE-2019-10780
PUBLISHED: 2020-01-22
BibTeX-ruby before 5.1.0 allows shell command injection due to unsanitized user input being passed directly to the built-in Ruby Kernel.open method through BibTeX.open.
CVE-2019-10781
PUBLISHED: 2020-01-22
In schema-inspector before 1.6.9, a maliciously crafted JavaScript object can bypass the `sanitize()` and the `validate()` function used within schema-inspector.