News

Over 1,800 iOS and Android Apps Contain Hardcoded AWS Credentials

Symantec Threat Hunter Team, part of Broadcom Software, has warned that mobile app developers often expose Amazon Web Services (AWS) credentials in their code, and such negligence could pose a threat to the entire supply chain.

Let me remind you that we also wrote that Former Amazon Employee Found Guilty of Hacking Capital One and Stealing Data from 100 Million People, and also that Amazon Introduces Access Analyzer is Cloud Basket Security Monitoring Service.

In total, the researchers found 1,859 apps containing hard-coded credentials from AWS, the majority (98%) of which are iOS apps, while only 37 Android applications were found.

Approximately 77% of the applications studied contained valid access tokens for AWS, which can be used to directly access private cloud services. Moreover, 874 applications contained valid tokens for AWS, which could be used to access the cloud, where databases of running services containing millions of records are stored.

Usually such databases store user account information, logs, registration information and other sensitive data, depending on the type of application.say the researchers.

In their report, the analysts highlighted three clear examples of how an AWS token leak can have disastrous consequences for both the authors of a problematic application and users.

One example was an unnamed B2B company that provides intranet and communications services to more than 15,000 small and medium-sized businesses. The SDK that this company makes available to its customers to access the services contains AWS keys that reveal all of the customer’s personal data stored on the platform.

Another case is the SDK used for third-party digital identity and authentication, which is used by several iOS banking apps. Due to hard-coded credentials in the cloud, all the authentication information of all the customers of these banks (approximately 300,000 people) is available, including names, dates of birth, and even biometric data (fingerprints).

Symantec experts also discovered a vulnerable sports betting platform used by 16 online gambling applications. Due to a mistake by the developers, the platform exposed its entire infrastructure and cloud services, granting potential attackers read and write permissions at the administrator level.

At the end of the report, the researchers identified several reasons why developers make such miscalculations and leave valid tokens and credentials in the code:

  1. downloading or uploading assets and resources required for the application to work (usually large media files, recordings or images);
  2. access to application configuration files and/or device registrations, as well as collecting device information and storing it in the cloud;
  3. access to cloud services that require authentication, such as translation services;
  4. without a specific reason, the code has not been updated for a long time and/or used for testing, but has not been cleaned up properly.
Sending
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Related Articles

Leave a Reply

Your email address will not be published.

Sending

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button