Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

12/12/2013
08:10 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Weak Security In Most Mobile Banking Apps

Eight of 10 iOS, Android mobile banking apps are improperly configured, new report says

Most mobile banking apps -- including those of major financial institutions -- contain configuration and design weaknesses that leave them with weakened security.

Security experts this month tested 275 Apple iOS- and Android-based mobile banking apps from 50 major financial institutions, 50 large regional banks, and 50 large U.S. credit unions. Overall, they found that eight out of 10 apps were improperly configured and not built using best practices software development. Among the big-name banks whose mobile apps were tested by security firm Praetorian include Bank of America, Citigroup, Wells Fargo, Goldman Sachs, Morgan Stanley, Capital One Financial, and Suntrust Banks. Praetorian did not disclose how each bank's apps fared in the tests.

Praetorian's research comes at a time when mobile banking is starting to take off, albeit slowly. Some 35 percent of U.S. adults conduct mobile banking, up from 24 percent in 2012, according to the Pew Research Center. A new report by NSS Labs says some banks report seeing mobile banking grow by up to 70 percent per year.

Nathan Sportsman, founder and CEO of Praetorian, says the security weaknesses in the mobile banking apps he and his team tested are not pure software vulnerabilities, so they are relatively low-risk issues that could ultimately lead to exploitation.

"These aren't business-logic or application-specific issues. They are weaknesses across the mobile apps -- things developers should be doing" but they are not, Sportsman says. The apps were downloadable from the Apple App Store and Google Marketplace.

The weaknesses the researchers tested for are well-known mitigation functions in software, and the tests were performed on each local device's mobile app, not back-end Web servers and services. Sportsman says the test only represents a snapshot of the full attack surface of mobile banking because between 75 to 90 percent of mobile banking occurs on the back end.

"This was not intrusive testing. We weren't looking for SQL injection and would need permission to do that, so we were really looking at the configuration of the mobile apps," he says. His firm hopes to next test these apps for how information gets stored on the local device, he says.

The test was conducted using Praetorian’s Project Neptune, its new mobile application security testing platform. Among the findings in the first test: Many of the iOS-based mobile banking apps did not have enabled Automatic Reference Counting (ARC), a memory management feature; Position Independent Executable, which prevents buffer overflows; and stack protection, which protects apps from "stack smashing."

"Stack smashing and ASLR [address space layout randomization] have been around a long time, and these [protections] should be enabled" in the apps, Sportsman says.

And many of the Android-based mobile banking apps were discovered to be targeting older versions of the Android software development kits, lacking permission hardening, and with the debugging function enabled.

"Permissions for me as a consumer are most important: What permissions is the app requesting, and do they really need them? Many overuse the permissions with more than they need," he says.

For developers, the older SDK-targeting and debugging features would be the biggest concerns, he says.

Large financial institutions, not surprisingly, faired better than credit unions or regional banks, but not dramatically: Credit unions had 108 configuration weaknesses in their apps; regional banks, 97; and large financial institutions, 75.

Why the configuration issues in these apps? Overall, there's a "rush-to-market" pressure for mobile banking in the technology-forward financial services industry, which can lead to some mistakes along the way, he says. "But we found that regional banks and credit unions tend to manifest this more than the megabanks ... and a lot of them tend to outsource the development, and it's more a one-and-done," he says. "But megabanks do theirs in-house, so there's more [ongoing] maintenance" with the apps, he says.

NSS Labs' Ken Baylor, meanwhile, notes that many mobile banking apps are still mostly rudimentary security-wise. "Most banks began offering mobile services with a simple redirect to a mobile site (with limited functionality) upon detection of the smartphone HTTP headers," he wrote in a new report on mobile financial malware. "Others created mobile apps with HTML wrappers for a better user experience and more functionality. As yet, only a few have built secure native apps for each platform."

"Many mobile banking apps are based on simplified HTML code, making them vulnerable to exploits -- this should prompt more banks to develop secure native apps for mobiles, incorporating fraud-resistant features like hardened in-app browsers, encryption and geolocation," Baylor said in the report.

Meanwhile, Praetorian is releasing a free tool that tests for these weaknesses in mobile apps, Sportsman says.

The full report on the mobile banking apps test is available here for download.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8860
PUBLISHED: 2020-02-22
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Samsung Galaxy S10 Firmware G973FXXS3ASJA, O(8.x), P(9.0), Q(10.0) devices with Exynos chipsets. User interaction is required to exploit this vulnerability in that the target must answer a phone call. ...
CVE-2020-8861
PUBLISHED: 2020-02-22
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1330 1.10B01 BETA Wi-Fi range extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue...
CVE-2020-8862
PUBLISHED: 2020-02-22
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-2610 Firmware v2.01RC067 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. The issue results from the...
CVE-2020-9330
PUBLISHED: 2020-02-21
Certain Xerox WorkCentre printers before 073.xxx.000.02300 do not require the user to reenter or validate LDAP bind credentials when changing the LDAP connector IP address. A malicious actor who gains access to affected devices (e.g., by using default credentials) can change the LDAP connection IP a...
CVE-2020-9327
PUBLISHED: 2020-02-21
In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.