Skip to main content

Dozens of iOS Apps Vulnerable to WiFi Snooping

Dozens of applications for Apple's mobile devices are vulnerable to WiFi snoopers, a security researcher reported this week.

Will Strafach, CEO of the Sudo Security Group, identified 76 popular iOS apps available at Apple's App Store that were vulnerable to wireless eavesdroppers, even though the connections were supposed to be protected by encryption.

There have been 18 million downloads of the vulnerable apps, he said.

Strafach categorized 33 of the vulnerable apps as "low risk." Potentially intercepted information included partially sensitive analytics data about a device and partially sensitive personal data, such as an email address or login credentials.

VivaVideo, Snap Upload for Snapchat, Volify, Loops Live, Private Browser, Aman Bank, FirstBank, VPN One Click Professional, and AutoLotto: Powerball, MegaMillions Lottery Tickets are some of the apps he assigned to the low-risk category.

Riskier Apps

Strafach categorized another 24 iOS apps as "medium risk." Potentially intercepted information included service login credentials and session authentication tokens for users logged onto the network.

Strafach labeled the remaining apps "high risk" because potentially intercepted information included the snatching of financial or medical services login credentials.

He did not identify the medium and high risk apps by name, in order to give their makers time to patch the vulnerability in their apps.

How concerned should users be about their security when using these apps?

"I tried to leave out anything regarding concern level, as I do not want to freak people out too much," Strafach told TechNewsWorld.

"While this is indeed a big concern in my opinion, it can be mostly mitigated by turning off WiFi and using a cellular connection to perform sensitive actions -- such as checking bank balances -- while in public," he said.

Man in the Middle Attack

If anything, Strafach is understating the problem, maintained Dave Jevans, vice president for mobile security products at Proofpoint.

"We've analyzed millions of apps and found this is a widespread problem," he told TechNewsWorld, "and it's not just iOS. It's Android, too."

Still, it likely is not yet a cause for great alarm, according to Seth Hardy, director of security research at Appthority.

"It's something to be concerned about, but we've never seen it actively exploited in the wild," he told TechNewsWorld.

What the vulnerability does is enable a classic man-in-the-middle attack. Data from the target phone is intercepted before it reaches its destination. It is then decrypted, stored, re-encrypted and then sent to its destination -- all without the user's knowledge.

To do that, an app needs to be fooled into thinking it's communicating with a destination and not an evesdropper.

"In order for a man-in-the-middle attack to be successful, the attacker needs a digital certificate that's either trusted by the application, or the application is not properly vetting the trust relationship," explained Slawek Ligier, vice president of engineering for security at Barracuda Networks.

"In this case, it appears that developers are developing applications in a way that allows any certificate to be accepted," he told TechNewsWorld. "If the certificate is issued and not expired, they're accepting it. They're not checking if it's been revoked or even if it's properly signed."

Developer's Problem

Should Apple act to weed these vulnerable apps from behind its walled garden?

"Apple should most certainly remove any of the offending apps from the App Store," said Sam McLane, head of security engineering at Arctic Wolf.

"This is something that is relatively easy to test for and should be enforced by Apple, since the trust model starts with the Apple ecosystem being safe for people to use," he told TechNewsWorld.

Strafach disagreed. "The setup now is exactly as it should be with regards to developer control of networking code," he said. "Developers can do something about this problem. For affected apps, the fix is only a few lines -- less than an hour tops, if that, to fix the matter in affected code."

Lazy Coders

If Apple tried to address this app vulnerability, it could create headaches for developers, especially those developing enterprise apps, noted Simeon Coney, chief strategy officer for AdaptiveMobile.

"A lot of app developers rely on current behaviors to do things like enterprise apps, which may not have a public certificate," he told TechNewsWorld, "so the responsibility lies more with the app developers to make sure their apps aren't bundled with this risk."

Apple doesn't want to force developers to fully trust certificates, added Ligier. "It will break a lot of things, especially internal apps, and generate a lot of unhappy users," he said.

Nevertheless, developers should not release apps that allow for third-party certificates to be blindly accepted, McLane maintained.

"This is entirely in their hands to remedy," he said. "It's easily tested and only out of laziness would someone ever ship an app that had this egregious security hole in production level code."

Comments

Popular posts from this blog

The Freedom 251 isn’t dead, it’s returned as the Freedom 420 4G feature phone for Rs 420(6.48$)

As we’re all aware by now, the  Freedom 251 smartphone  turned out to be a sham. The makers of the smartphone, resellers to be precise, were unable to follow through on their promise of delivering a smartphone at Rs 251 to the Indian public. Practically speaking, building such a  smartphone was impossible  to begin with. The bill of materials alone would place the cost of the device at over Rs 1,000 and despite claims of unnamed “partnerships” and tax breaks under the Make In India initiative, it would have been impossible to bring down the price of the smartphone and the plan fizzled out. Reality struck a harsh blow to the company and it’s offices have since been shut down. The original owners have also quietly disappeared and at least one has been arrested. It now appears that the company never gave up trying. We’ve learned that the company, now under new management, has taken a more realistic approach to the problem and have come up with yet another outra...

New photos show Tesla's massive Nevada factory is coming along

'Guess we shouldn't be too surprised that the what's going to be world's largest factory...continues to get larger. Tesla's Gigafactory, a gleaming white structure amid the muted browns surrounding Reno, Nevada, seems to be coming along, according to photos snapped by NM Group, a company that describes itself as specializing in "surveying and mapping, asset modeling and management, and engineering." The group was recently mapping the area for potential power lines on behalf of an electricity company, according to Tim Hustwayte, a senior client manager based in the United Kingdom. The route took them close to the Gigafactory, and they got some shots that appear to show the factory having bulked up since Tesla's battery cell began rolling off production lines at the start of the year. The Gigafactory employed nearly 3,000 people at the start of the year, less than half of how many people are expected to be employed there...

iOS 10.3 is freeing up extra storage space, users say

Finally, an update that actually gives you storage space back.  Apple launched its latest software update, iOS 10.3, on Monday. The update comes with new features like "Find My AirPods," but users seem to be noticing an added bonus: It's allegedly freeing up their storage space.  Follow Atanas   @atanastsekov Wow, iOS 10.3 gave me 3 gigs of storage  # ios103 9:19 AM - 28 Mar 2017  ·  Stratford, London     157 157 Retweets     423 423 likes  Follow Jonny   @jonnymmxvi On iOS 10.2 I had 215GB and now on iOS 10.3 with APFS I have 220GB of free storage! That's amazing!!!!!! 11:00 AM - 28 Mar 2017     96 96 Retweets     272 272 likes  Follow Rei Todoroki   @ReiTodoroki Wow! iOS 10.3 decreased the amount of storage space I was taking up. 3:27 AM - 28 Mar 2017     9...