Is Your
Favorite App Sharing Your Company’s Data
Over the first half of this decade, countless devices have been injected
into the corporate workforce by the BYOD (Bring Your Own Device) trend.
Security professionals expected mobile viruses and malware incidents to tag
along with them, resulting in a huge uptick in incidents mirroring the
situation that began in the PC ecosystem fifteen years ago.
However, these worries have largely been
in vain, according to a recently released report from app analysis vendor Appthority, mobile app data leakage and collection
is posing a far greater risk to business users than anyone could have
imagined.
The culprit? Data mining by Apps.
Digging For (Your) Gold
The report detailed the widespread
collection of data by the current top 100 free and top 100 paid apps on both
Android and iOS smartphone platforms. Appthority ran a comprehensive range of
static, dynamic and behavioral analysis against all 400 apps in a test
environment.
The report showed that among free Android apps, 88% of the
top 100 apps available on Google Play collect user data in the form of, unique
device identifiers (UDIDs) or IMEIs, while 82% engage in location tracking and 30% access users' address
books. These are typically default settings.
Though Apple states iOS is a more secure
and privacy focused alternative to Android, the stats weren't much
better for their platform. More than half of the top 100 free apps on the
App Store engage in the same UDID and location tracking, and 26% also access
users' address books.
Even when users paid for apps, the report
found that data collection was still prevalent. Out of the top 100 paid Android
apps, for instance, 65% still utilized UDID details, 49% collected location
data and 14% accessed address books. On the iOS side, 28% used UDIDs, 24%
collected location data and 8% accessed address books.
Why it Matters
Mobile app data collection exposes
enterprises and users to a number of risks that are not usually considered by IT departments.
For example, if a user syncs their corporate Outlook account with an unmanaged
smartphone, that device and all its apps will have access to an address book
that contains contact details for the user’s contacts, company’s customers and
suppliers. If an app that collects that address book information is
compromised, attackers could have the information necessary to send spam to
those contacts, gather client’s phone details, read calendar entries, and
access confidential information such as contracts or quotes sent via email.
Although most organizations outside
government don’t appear concerned about apps sharing location tracking data
they really should take note. Think of it this way: If a third party can
discover the location of key executives, they could utilize that information to
predict M&A activity. From a HR
perspective it is most likely true that most employees would not want to have
their after work movements tracked by an employer, no matter how
innocent while, say on a business trip.
Or from a life and death perspective a
U.S. soldier shared a picture on Twitter of himself arriving at an Iraqi base.
The picture included location details via geo tagging and shared on the
internet. These were downloaded enemy
soldiers who launched a mortar attack on the exact location the soldier landed destroying
the U.S. military helicopters on the base.
Where Does Your Data Go?
Data collection by mobile apps alone is
cause for concern; however the report goes on to list ad networks as the ultimate destination of the data.
Seventy one percent of the top free Android
apps and 38% of the top Android paid apps share user data with ad
networks. Meanwhile 32% of the top iOS free apps and 16% of the top iOS
paid apps share user data with mobile ad networks.
Users are frequently not aware of such
data collection practices because the privacy policy is posted obscurely on the
app developer's website.
A Phoenix-based security researcher Joe Giron found that a surprising amount of users’ data is being collected by the company’s mobile application and labels it as nothing more than malware. Joe writes in his Security Blog
"Christ man! Why the hell would it want access to my camera, my phone calls, my Wi-Fi neighbors, my accounts, etc?" "Why the hell is this here? What’s it sending? Why? Where? I don’t remember agreeing to allow Uber accedes to my phone calls and SMS messages"
A Phoenix-based security researcher Joe Giron found that a surprising amount of users’ data is being collected by the company’s mobile application and labels it as nothing more than malware. Joe writes in his Security Blog
"Christ man! Why the hell would it want access to my camera, my phone calls, my Wi-Fi neighbors, my accounts, etc?" "Why the hell is this here? What’s it sending? Why? Where? I don’t remember agreeing to allow Uber accedes to my phone calls and SMS messages"
The huge growth of mobile ad networks
poses multiple risks. According to the leaked Snowdon papers,
attackers can pose as an ad network and obtain user data directly; they could
compromise an ad network's software development kit and infiltrate an app, or
simply target the potentially vast data collection being stored by
dozens of ad networks around the world. The
user’s details are then used to initiate large scale malware and phishing attacks.
How Do We Secure Apps?
Currently there are an estimated one
million BYOD connected apps in the workplace and more than 80% of those apps
have access to corporate data. The same apps that make the device useful or fun
could potentially cause harm to a business. The harm could be from poor
design practices or simply because the app is working exactly as it designed to
work, collecting your data.
There is a workplace solution for securing
Apps in the enterprise, though. Apps can be managed with secure containerization
through EMM. Strategy Analytics recently recognized BlackBerry BES10 as the most cost effective and comprehensive EEM
solution available. BES10 can manage BlackBerry, iOS and Android devices
by setting up a personal workspace and an enterprise workspace. The personal
workspace can have the user’s private apps and images. But the enterprise
workspace will contain all work related documents or work contacts and data
collecting apps cannot access that portion of the device. Data-collecting
apps are shut out and cannot access that portion of the device.
The United Kingdom’s Centre for the Protection of National
Infrastructure deploys
BES to secure sensitive government data, and provides
a great example of a large-scale deployment tackling the issue head-on.
No comments:
Post a Comment