Skip to main content

Dozens of iOS Apps Vulnerable to WiFi Snooping

Dozens of applications for Apple's mobile devices are vulnerable to WiFi snoopers, a security researcher reported this week.

Will Strafach, CEO of the Sudo Security Group, identified 76 popular iOS apps available at Apple's App Store that were vulnerable to wireless eavesdroppers, even though the connections were supposed to be protected by encryption.

There have been 18 million downloads of the vulnerable apps, he said.

Strafach categorized 33 of the vulnerable apps as "low risk." Potentially intercepted information included partially sensitive analytics data about a device and partially sensitive personal data, such as an email address or login credentials.

VivaVideo, Snap Upload for Snapchat, Volify, Loops Live, Private Browser, Aman Bank, FirstBank, VPN One Click Professional, and AutoLotto: Powerball, MegaMillions Lottery Tickets are some of the apps he assigned to the low-risk category.

Riskier Apps

Strafach categorized another 24 iOS apps as "medium risk." Potentially intercepted information included service login credentials and session authentication tokens for users logged onto the network.

Strafach labeled the remaining apps "high risk" because potentially intercepted information included the snatching of financial or medical services login credentials.

He did not identify the medium and high risk apps by name, in order to give their makers time to patch the vulnerability in their apps.

How concerned should users be about their security when using these apps?

"I tried to leave out anything regarding concern level, as I do not want to freak people out too much," Strafach told TechNewsWorld.

"While this is indeed a big concern in my opinion, it can be mostly mitigated by turning off WiFi and using a cellular connection to perform sensitive actions -- such as checking bank balances -- while in public," he said.

Man in the Middle Attack

If anything, Strafach is understating the problem, maintained Dave Jevans, vice president for mobile security products at Proofpoint.

"We've analyzed millions of apps and found this is a widespread problem," he told TechNewsWorld, "and it's not just iOS. It's Android, too."

Still, it likely is not yet a cause for great alarm, according to Seth Hardy, director of security research at Appthority.

"It's something to be concerned about, but we've never seen it actively exploited in the wild," he told TechNewsWorld.

What the vulnerability does is enable a classic man-in-the-middle attack. Data from the target phone is intercepted before it reaches its destination. It is then decrypted, stored, re-encrypted and then sent to its destination -- all without the user's knowledge.

To do that, an app needs to be fooled into thinking it's communicating with a destination and not an evesdropper.

"In order for a man-in-the-middle attack to be successful, the attacker needs a digital certificate that's either trusted by the application, or the application is not properly vetting the trust relationship," explained Slawek Ligier, vice president of engineering for security at Barracuda Networks.

"In this case, it appears that developers are developing applications in a way that allows any certificate to be accepted," he told TechNewsWorld. "If the certificate is issued and not expired, they're accepting it. They're not checking if it's been revoked or even if it's properly signed."

Developer's Problem

Should Apple act to weed these vulnerable apps from behind its walled garden?

"Apple should most certainly remove any of the offending apps from the App Store," said Sam McLane, head of security engineering at Arctic Wolf.

"This is something that is relatively easy to test for and should be enforced by Apple, since the trust model starts with the Apple ecosystem being safe for people to use," he told TechNewsWorld.

Strafach disagreed. "The setup now is exactly as it should be with regards to developer control of networking code," he said. "Developers can do something about this problem. For affected apps, the fix is only a few lines -- less than an hour tops, if that, to fix the matter in affected code."

Lazy Coders

If Apple tried to address this app vulnerability, it could create headaches for developers, especially those developing enterprise apps, noted Simeon Coney, chief strategy officer for AdaptiveMobile.

"A lot of app developers rely on current behaviors to do things like enterprise apps, which may not have a public certificate," he told TechNewsWorld, "so the responsibility lies more with the app developers to make sure their apps aren't bundled with this risk."

Apple doesn't want to force developers to fully trust certificates, added Ligier. "It will break a lot of things, especially internal apps, and generate a lot of unhappy users," he said.

Nevertheless, developers should not release apps that allow for third-party certificates to be blindly accepted, McLane maintained.

"This is entirely in their hands to remedy," he said. "It's easily tested and only out of laziness would someone ever ship an app that had this egregious security hole in production level code."

Comments

Popular posts from this blog

The Freedom 251 isn’t dead, it’s returned as the Freedom 420 4G feature phone for Rs 420(6.48$)

As we’re all aware by now, the  Freedom 251 smartphone  turned out to be a sham. The makers of the smartphone, resellers to be precise, were unable to follow through on their promise of delivering a smartphone at Rs 251 to the Indian public. Practically speaking, building such a  smartphone was impossible  to begin with. The bill of materials alone would place the cost of the device at over Rs 1,000 and despite claims of unnamed “partnerships” and tax breaks under the Make In India initiative, it would have been impossible to bring down the price of the smartphone and the plan fizzled out. Reality struck a harsh blow to the company and it’s offices have since been shut down. The original owners have also quietly disappeared and at least one has been arrested. It now appears that the company never gave up trying. We’ve learned that the company, now under new management, has taken a more realistic approach to the problem and have come up with yet another outrageous, but less lud

Galaxy S8 specs vs. Google Pixel, LG G6, iPhone 7 and OnePlus 3T

Samsung finally unveiled the Galaxy S8 and larger Galaxy S8 Plus counterpart this morning in New York, after months of anticipation and a continuous flow of leaks. The phone features its own digital assistant, Bixby, Android 7.0 Nougat and is souped up to handle ultra-fast, 1Gb data speeds. Its specs are also on par with -- if not better than -- a handful of the most popular flagships today, including Android heavyweights the Google Pixel and the LG G6, Apple's massively popular iPhone 7 and the sleeper hit OnePlus 3T. In terms of hardware, the Galaxy S8 has the most recent Snapdragon 835 chipset, a water-resistant construction that's rated IP68 and a super sharp 2,960x1,440-pixel resolution. Samsung Galaxy S8 comparison chart Samsung Galaxy S8 Google Pixel LG G6 Apple iPhone 7 Plus OnePlus 3T Display size, resolution 5.8-inch; 2,960x1,440 pixels 5-inch; 1,920x1,080 pixels 5.7-inch, 2,880x1,440 pixels 5.5-inch; 1,920x1,080 pixels 5.5-inch; 1,920x1,080 pixels P

Internet providers in US say that they are not going to sell their consumers’ internet browsing history

Comcast Corp, Verizon Communications Inc and AT&T Inc said Friday they would not sell customers’ individual internet browsing information, days after the US Congress approved legislation reversing Obama administration era internet privacy rules. The bill would repeal regulations adopted in October by the Federal Communications Commission under former President Barack Obama requiring internet service providers to do more to protect customers’ privacy than websites like Alphabet Inc’s Google or Facebook Inc . The easing of restrictions has sparked growing anger on social media sites. “We do not sell our broadband customers’ individual web browsing history. We did not do it before the FCC’s rules were adopted, and we have no plans to do so,” said Gerard Lewis, Comcast’s chief privacy officer. He added Comcast is revising its privacy policy to make more clear that “we do not sell our customers’ individual web browsing information to third parties.” Verizon does not sell person