Application Security: Spotlight

1
101

Cybersecurity and protecting the network reside squarely in the corporate IT spotlight, yet there’s a shadow area where it’s time to shine a light: Application security. Too often it’s the app client that’s the weakest link and becomes the entry point for hackers and malware. The view of many IT security professionals is that if the network servers are secure, important business assets are protected.

What’s often overlooked is that enterprise servers are constantly communicating with a wide variety of mobile and web applications, ranging from internal communication apps to those residing on employee’s devices (who could be using them to access the company network — without the knowledge of IT).

But apps don’t store critical information, so any damage is minimal, right? Wrong. Apps may not store critical company data, but servers do. Hackers maybe able to eventually compromise the servers by access via unsecure apps. 85% of the top 200 free apps on Google Play can be decompiled. Do any of your employees have mobile fitness apps on their phone? When we analyzed the top 10 fitness apps on the market, we discovered all of the apps had at least some critical and medium security vulnerabilities.

Moreover, they all had a possibility of getting decompiled, which could bring subsequent hacking damages.

Application Security Lock

Application Security Vulnerabilities

Let’s take a look at a few possible security scenarios where apps may be vulnerable.

Copycat apps. A prime asset for any software company is source code. One well-known gaming company, Supercell, expended significant resources and money developing a story line, characters, graphics and more for Clash Royale, a freemium mobile tower rush video game.

The game was soft-launchedin 2016 in a few countries, but within 4 weeks, a copycat app showed up. By re-engineering the source code, rogue hackers based in China were able to bypass normal development costs and time by simply bringing to market an already developed mobile game. By the time the true game developers entered the market, the copycat app already had a toehold in these markets.

Malware expulsion. A hacker compromises an app, reverse engineers the source code and inserts a type of malware that infects the corporate network. The malware could be used for DDoS attacks. Or, servers could be crypto jacked and the CPU or GPU power used to illegally mine digital currency. A company may also unknowingly distribute the malware, infecting unsuspecting customers and prospects. Unfortunately, it’s difficult to predict what damage malicious malware could do in the future, but it certainly could monitor activities, messages, phone calls, or photos.

Source code manipulation and payment fraud. If hackers manipulate the software code of a company’s payment system, from the IT security professional’s view, payments are flowing properly. The money is flowing to the hacker’s bank account and there’s no way to get the money back.

Protecting Your Apps and Servers

In one of the largest data breaches in the United States, Equifax said in a statement that “Equifax’s Security team observed suspicious network traffic associated with its U.S. online dispute portal web application.”

Through the attack, criminals had potential access to files that contained names, Social Security numbers, birth dates, addresses, and, in some instances, driver’s license numbers.Warning signs that apps have compromised enterprise servers may be subtle. In the Equifax breach, the security team observed suspicious network traffic. We recommend employing obfuscation and encryption of core files and libraries.

Closely monitor your security status on an ongoing basis. Analyze and modify source code or binary files for protection. If an incident occurs, you must be able to take action as quickly as possible. For any internal apps, we recommend starting with the design phase and incorporating security testing throughout the development life cycle.

Additionally, IT security professionals should also pay attention to customer feedback and online reviews. For example, if complaints crop up that a device seem to be running slow, that might be a sign that an app has been compromised. We can’t stress enough that apps can be leveraged by hackers to access your enterprise servers and your sensitive data. It’s time to widen your cybersecurity spotlight–your business could depend upon it.

1 COMMENT

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.