Bookkeeping Service Providers

  • Accounting
  • Bookkeeping
  • US Taxation
  • Financial Planning
  • Accounting Software
  • Small Business Finance
You are here: Home / SECURITY / Lack of developer attention to cloud security prompts alerts

Lack of developer attention to cloud security prompts alerts

May 21, 2021 by cbn Leave a Comment

The discovery of 23 leaky Android applications by Check Point Research (CPR) – which may, collectively, have put the personal data of more than 100 million users at risk – has prompted fresh warnings, and reminders, over how critical it is for software developers to keep on top of potential security slip-ups.

Check Point said it found publicly available, sensitive data from real-time databases in 13 Android apps, with between 10,000 and 10 million downloads apiece, and push notification and cloud storage keys embedded in many of the apps themselves. The vulnerable apps included apps for astrology, taxis, logo-making, screen recording and faxing, and the exposed data included emails, chat messages, location metadata, passwords and photos.

In every case, the exposure came about because of a failure to follow best practices when configuring and integrating third-party cloud services into the applications. CPR approached Google and all of the app providers prior to disclosure, some of which have since locked down their exposed instances.

“Mobile devices can be attacked via different ways. This includes the potential for malicious apps, network-level attacks, and exploitation of vulnerabilities within devices and the mobile OS,” the CPR team said in a disclosure blog.

“As mobile devices become increasingly important, they have received additional attention from cyber criminals. As a result, cyber threats against these devices have become more diverse. An effective mobile threat defence solution needs to be able to detect and respond to a variety of different attacks while providing a positive user experience.”

Veridium chief operating officer Baber Amin said there was no way the average Android user would have the technical ability to evaluate every element of the apps they downloaded, and since the problem is one of misconfigured access rules at the back end, there was essentially nothing they could do. However, users are still the ones who will suffer from their data being exposed.

“As mobile devices become increasingly important, they have received additional attention from cyber criminals. As a result, cyber threats against these devices have become more diverse”
Check Point Research

“As the end result is information leakage, which also includes credentials, one thing users have control over is good password hygiene,” said Amin.

“Users can protect themselves to a certain degree by any of the following: not reusing passwords; not using passwords with obvious patterns; keeping an eye out for messages from other services they use on login attempts, password reset attempts or account recovery attempts; ask the application owner to support passwordless options, ask the application developer to support native on-device biometrics, look for alternate applications that have stated security and privacy practices, ask Google and Apple to do more due diligence on the back-end security of the applications they allow on their marketplace.”

Tom Lysemose Hansen, chief technology officer at Norway-based app security firm Promon, said Check Point’s findings were, on the whole, disappointing, as they highlighted “rookie errors” in the developer community.

“While it would be unfair to expect someone to never make a mistake, this is more than just a one-off. App data should always be protected. It’s as simple as that. Not obfuscated or hidden away, but protected,” he said.

“Accessing user messages is bad enough, but that’s not the worst of it. Should an attacker find a way to access API keys, for example, they can easily extract them and build fake apps that impersonate the real ones to make arbitrary API calls, or otherwise access an app’s back-end infrastructure to scrape information from servers.

“These types of attacks can result in serious data breaches and, aside from the associated fines, can have damaging effects on brand reputation,” added Hansen.

Trevor Morgan, product manager at comforte AG, said the increased attack surface allowed for by cloud environments made security harder for the companies that rely on them.

“With a hybrid and multicloud strategy, data becomes dispersed across multiple clouds as well as their own datacentres. Data security becomes even more difficult to manage as cloud infrastructure complexity grows,” he said.

“Combined with a modern DevOps culture, misconfigurations and general security requirements that are overlooked or flat-out ignored are becoming commonplace,” he said.

“Combined with a modern DevOps culture, misconfigurations and general security requirements that are overlooked or flat-out ignored are becoming commonplace”
Trevor Morgan, comforte AG

Since potentially sensitive data is required for many apps to function properly – especially those that generate revenue – data protection must be an important part of the development process and the overall protection framework, said Morgan.

He advised developers to adopt data-centric security practices to protect data even if other security layers fail or are bypassed, and said those using technologies such as tokenisation and format-preserving encryption were in a far better position to ensure that an incident such as an incorrectly configured cloud service does not necessarily develop into a full-blown data breach.

But Chenxi Wang, general partner at security investment specialist Rain Capital and a former Forrester research vice-president, said the blame should not fall entirely to the app developers.

“Developers don’t always know the right things to do with regard to security. App platforms like Google Play and Apple Appstore must provide deeper testing, as well as incentivising the right behaviour from developers to build security in from the beginning,” said Wang.

“This discovery underscores the importance of security-focused app testing and verification,” she added.

Share on FacebookShare on TwitterShare on Google+Share on LinkedinShare on Pinterest

Filed Under: SECURITY

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • May 2021
  • April 2021
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • March 2016

Recent Posts

  • How Azure Cobalt 100 VMs are powering real-world solutions, delivering performance and efficiency results
  • FabCon Vienna: Build data-rich agents on an enterprise-ready foundation
  • Agent Factory: Connecting agents, apps, and data with new open standards like MCP and A2A
  • Azure mandatory multifactor authentication: Phase 2 starting in October 2025
  • Microsoft Cost Management updates—July & August 2025

Recent Comments

    Categories

    • Accounting
    • Accounting Software
    • BlockChain
    • Bookkeeping
    • CLOUD
    • Data Center
    • Financial Planning
    • IOT
    • Machine Learning & AI
    • SECURITY
    • Uncategorized
    • US Taxation

    Categories

    • Accounting (145)
    • Accounting Software (27)
    • BlockChain (18)
    • Bookkeeping (205)
    • CLOUD (1,322)
    • Data Center (214)
    • Financial Planning (345)
    • IOT (260)
    • Machine Learning & AI (41)
    • SECURITY (620)
    • Uncategorized (1,284)
    • US Taxation (17)

    Subscribe Our Newsletter

     Subscribing I accept the privacy rules of this site

    Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in