Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

5/16/2017
12:34 PM
0%
100%

Study: Rooted Androids, Jailbroken iPhones Found in Enterprises

A study released today gives greater insight into some of the worst fears for security pros trying to manage employees' BYOD mobile phones.

INTEROP ITX - Las Vegas - A jailbroken iPhone or a rooted Android phone that connects to the corporate network is one of the greatest fears of CISOs and other security team members, according to a new study.

Their fears are not unfounded. Mobile security firm Lookout Security found five in every 1,000 Android devices in enterprises were rooted, while one in every 1,000 iPhones device was jailbroken. Lookout's data came from consumer and corporate data from over 100 million Android and iOS devices around the globe over the past 12 months.

In order to jailbreak an iPhone or root an Android device, the security features need to be turned off first. Once the security measures are set aside, attackers can then infiltrate the smartphones and steal data, says Andrew Blaich, a security researcher for Lookout.

The second-most concern for security teams are mobile apps. Users are living dangerously when downloading mobile apps from anywhere other than the sanctioned Apple Store or Google Play Store, Blaich says. Over a six-month period, Lookout discovered that on average 11 out of every 100 iOS devices had apps that were sideloaded onto the device.

Based on a review of more than 100 million Android and iOS devices, the study found that roughly a third of the apps retrieved more information than would appear necessary:

  • 30% of apps access to contact information
  • 30% of apps access GPS information
  • 31% of apps access calendar information
  • 39% access the smartphone's microphone
  • 75% access the camera

In some cases, even the app developers were not aware that their games app, for example, was copying calendar information off of a phone. "Developers may use an SDK to create the app and not be fully aware of the potential of the SDK to pull in more information than they were aware of," Blaich says.

As a result, app behaviors like these can potentially violate a corporate policy because sensitive company data may be leaking out, which in turn could lead to a significant compliance risk for the company.

The network is the third major area CISOs and security professionals need to monitor, as it relates to mobile devices. Blaich says networks face the big risk of potentially having its traffic intercepted and then re-directed via a man-in-the-middle attack.

Related Content:

 

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jfd-therealone
50%
50%
jfd-therealone,
User Rank: Apprentice
5/16/2017 | 1:23:47 PM
Policies Help
It may be time for organizations to update their AUP and/or Internet use policy.
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31458
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...