{"id":77838,"date":"2015-08-13T22:04:16","date_gmt":"2015-08-14T02:04:16","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-12-29T17:57:43","modified_gmt":"2021-12-29T22:57:43","slug":"mobile-apps-leaking-your-info","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/mobile-apps-leaking-your-info\/","title":{"rendered":"Mobile Apps Leaking Your Info"},"content":{"rendered":"<p><a href=\"https:\/\/www.clearswift.com\/blog\/2014\/09\/22\/australian-federal-police-department-sensitive-data-leak-scandal\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-102576 size-medium\" title=\"Mobile Apps Leaking Your Info\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_leak.png?resize=150%2C98&#038;ssl=1\" alt=\"Mobile Apps Leaking Your Info\" width=\"150\" height=\"98\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_leak.png?resize=150%2C98&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_leak.png?resize=75%2C49&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_leak.png?w=291&amp;ssl=1 291w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>Just in time for <a href=\"https:\/\/www.blackhat.com\/us-15\/\" target=\"_blank\" rel=\"noopener noreferrer\">Blackhat<\/a>, <a title=\"San Francisco\" href=\"http:\/\/maps.google.com\/maps?ll=37.7833333333,-122.416666667&amp;spn=0.1,0.1&amp;q=37.7833333333,-122.416666667 (San%20Francisco)&amp;t=h\" target=\"_blank\" rel=\"geolocation nofollow noopener noreferrer\">San Francisco-<\/a>based <strong><a href=\"https:\/\/www.securityweek.com\/symantec-acquires-appthority-javelin-networks\" target=\"_blank\" rel=\"noopener noreferrer\">Appthority<\/a><\/strong>\u00a0released its <a href=\"https:\/\/web.archive.org\/web\/20170127143454\/https:\/\/www.appthority.com\/learn\/\" target=\"_blank\" rel=\"noopener noreferrer\">Q2 2015 Enterprise Mobile Threat Report<\/a>. The big headline from the Appthority report is that enterprise <a title=\"Mobile app\" href=\"http:\/\/en.wikipedia.org\/wiki\/Mobile_app\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">mobile apps<\/a> are leaking your info.<strong> They are sending personally identifiable information (PII) and other sensitive information all over the world<\/strong> often without the enterprise&#8217;s knowledge. Your phone is leaking your info all over the web.<\/p>\n<p><em><a href=\"https:\/\/www.securityweek.com\/symantec-acquires-appthority-javelin-networks\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102581 size-thumbnail\" title=\"Appthority logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/appthority_logo.jpg?resize=75%2C75&#038;ssl=1\" alt=\"Appthority logo\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/appthority_logo.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/appthority_logo.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/appthority_logo.jpg?w=400&amp;ssl=1 400w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a><a href=\"https:\/\/web.archive.org\/web\/20160608213226\/http:\/\/www.fiercemobileit.com:80\/\" target=\"_blank\" rel=\"noopener noreferrer\">FierceMobileIT<\/a><\/em> <a href=\"https:\/\/web.archive.org\/web\/20151110020401\/http:\/\/www.fiercemobileit.com:80\/story\/enterprise-mobile-apps-send-sensitive-data-all-over-world-without-permissio\/2015-08-05\" target=\"_blank\" rel=\"noopener noreferrer\">says<\/a> that the <a href=\"https:\/\/web.archive.org\/web\/20170128223130\/https:\/\/www.appthority.com\/enterprise-mobile-threats\/\" target=\"_blank\" rel=\"noopener noreferrer\">Appthority Enterprise Mobile Threat Team<\/a> (EMTT) collected and analyzed security and <strong>risky behaviors in three million apps.<\/strong> They found that the top <strong>iOS apps sent data to 92 different countries<\/strong>, while the top <strong>Android apps are leaking your info to 63 different countries<\/strong>.<\/p>\n<h3>Zombie apps are leaking your info<\/h3>\n<p>The report found another threat to all data. Appthority&#8217;s all-in-one App Risk Management service shows that 100% of enterprises surveyed have <strong>zombie apps<\/strong> in their environments. Zombie apps are apps that have been <strong>revoked by the app stores<\/strong> and are no longer getting security updates. Zombie apps can give attackers a conduit into the enterprise.<\/p>\n<p><span class=\"tx\"><a href=\"https:\/\/web.archive.org\/web\/20220120162200\/https:\/\/gigaom.com\/2009\/11\/19\/cut-the-drama-people-private-apis-the-app-store-you\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102583 size-medium\" title=\"zombie apps\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/apps_iphone.jpg?resize=150%2C95&#038;ssl=1\" alt=\"zombie apps\" width=\"150\" height=\"95\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/apps_iphone.jpg?resize=150%2C95&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/apps_iphone.jpg?resize=75%2C47&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/apps_iphone.jpg?w=402&amp;ssl=1 402w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>The report estimates that 5.2% of the\u00a0<a title=\"Apple Computers\" href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a> (<a title=\"NASDAQ : AAPL\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>) iOS apps on employee devices in an enterprise are dead apps, and 37.3% are s<\/span><span class=\"tx\">tale Apps. On\u00a0<a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>) Android devices,\u00a0<\/span><span class=\"tx\">3.9% are dead apps and 31.8% are stale apps.<\/span><\/p>\n<p>Zombie apps can leak your info. Appthority explains that malicious third parties could use a man-in-the-middle attack to hijack the update mechanism for these apps to install new malware on user devices.<\/p>\n<h3>Threat to the enterprise<\/h3>\n<p>Despite the threats, app stores run by\u00a0Apple,\u00a0Google, and\u00a0<a title=\"Microsoft\" href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> (<a title=\"NASDAQ | MSFT\" href=\"https:\/\/www.google.com\/finance?cid=358464\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>) are under no regulatory obligation to tell users of revoked apps anything after release. Including <span class=\"tx\">copyright\u00a0<\/span><span class=\"tx\">infringements or serious security\/privacy concerns. <\/span><span class=\"tx\">\u00a0T<\/span>he report points out.\u00a0<a title=\"Domingo Guerra\" href=\"https:\/\/web.archive.org\/web\/20181107000134\/https:\/\/www.crunchbase.com\/person\/domingo-guerra\" target=\"_blank\" rel=\"crunchbase nofollow noopener noreferrer\">Domingo Guerra<\/a>, president, and co-founder of Appthority classified this as a stealthy risk; \u201c<em>The ongoing threat of zombie apps and stale apps continues to be an &#8216;under the radar&#8217; threat to the enterprise.<\/em>&#8221;<\/p>\n<p><a href=\"http:\/\/www.nist.gov\/public_affairs\/releases\/pioneer_062310.cfm\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102585 size-medium\" title=\"programmers\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/programmer.jpg?resize=140%2C150&#038;ssl=1\" alt=\"programmers\" width=\"140\" height=\"150\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/programmer.jpg?resize=140%2C150&amp;ssl=1 140w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/programmer.jpg?resize=70%2C75&amp;ssl=1 70w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/programmer.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 140px) 100vw, 140px\" \/><\/a>A third risk to the firm\u2019s data comes from their own <strong>programmers <\/strong>according to the venture capital-backed Appthority. The firm says over-taxed enterprise app development teams are increasingly relying on third-party libraries and software development kits. Vulnerabilities in the <strong>third-party packages<\/strong> can put enterprise data\u00a0at risk when they get baked into a corporate app.<\/p>\n<p>The company told <em><a href=\"https:\/\/web.archive.org\/web\/20170702234423\/http:\/\/www.csoonline.com\/article\/2915533\/mobile-security\/zombie-apps-haunt-byod-workplaces.html\" target=\"_blank\" rel=\"noopener noreferrer\">CSO<\/a><\/em> that few mobile devices have security applications installed. In particular, only 4 percent of Android devices in use within enterprises had on-device scanning solutions.<\/p>\n<p><strong><em>Rb-<\/em><\/strong><br \/>\n<em> Firms that depend on mobile solutions as part of a Bring Your Own Device (<a title=\"Bring your own device\" href=\"http:\/\/en.wikipedia.org\/wiki\/Bring_your_own_device\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">BYOD<\/a>) effort need to look after their apps as well as connectivity and hardware and data and governance and reimbursements. Bring your own device hardly seems like a cost saver to me.<\/em><\/p>\n<p><em>I have said this repeatedly, it seems like costs are just being moved around. From spending on a PC in the office that is very less likely to be lost and that can be controlled to a bunch of new <a title=\"Enterprise software\" href=\"http:\/\/en.wikipedia.org\/wiki\/Enterprise_software\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">enterprise applications<\/a> like <a title=\"Enterprise mobility management\" href=\"http:\/\/en.wikipedia.org\/wiki\/Enterprise_mobility_management\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">EMM<\/a>, mobile anti-malware to app monitoring.<\/em><\/p>\n<h6><\/h6>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/www.itbusiness.ca\/news\/it-world-canada-fights-for-survival\/127460\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Beware of Zombie apps on mobile devices: Report<\/a> (itworldcanada.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Appthority has identified three ways that mobile apps are leaking your info like name, email address, and other PII across the globe.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3277,420,202,610,101,892,35,536,92,1135,304,82,421,4,1543],"class_list":["post-77838","post","type-post","status-publish","format-standard","hentry","category-security","tag-3277","tag-aapl","tag-android","tag-app-store","tag-apple","tag-apps","tag-china","tag-goog","tag-google","tag-ios","tag-iphone","tag-microsoft","tag-msft","tag-security","tag-zombie"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77838","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=77838"}],"version-history":[{"count":20,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77838\/revisions"}],"predecessor-version":[{"id":116569,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77838\/revisions\/116569"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=77838"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=77838"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=77838"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}