Mobile Application Security Study



Similar documents
Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Assuring Application Security: Deploying Code that Keeps Data Safe

Real-time hybrid analysis:

Information Security Services

Rational AppScan & Ounce Products

elearning for Secure Application Development

Passing PCI Compliance How to Address the Application Security Mandates

HP ProLiant Essentials Vulnerability and Patch Management Pack Server Security Recommendations

SAST, DAST and Vulnerability Assessments, = 4

Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

Mobile Application Security Report 2015

HP Fortify Software Security Center

Where every interaction matters.

SECURING MOBILE APPLICATIONS

OWASP Mobile Top Ten 2014 Meet the New Addition

Weak Spots in Enterprise Mobility Management Dennis Schröder

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001

Web Application Security

USB Secure Management for ProCurve Switches

Effective Software Security Management

Security and Vulnerability Testing How critical it is?

The Top Web Application Attacks: Are you vulnerable?

Adobe Systems Incorporated

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Coalfire Systems Inc.

Application Security in the Software Development Lifecycle

Network Security Audit. Vulnerability Assessment (VA)

Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities.

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

HP Application Security Center

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Be Fast, but be Secure a New Approach to Application Security July 23, 2015

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

2015 Vulnerability Statistics Report

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

90% of data breaches are caused by software vulnerabilities.

Criteria for web application security check. Version

How to Instrument for Advanced Web Application Penetration Testing

How To Protect A Web Application From Attack From A Trusted Environment

The State of Mobile Application Insecurity

Impact of Data Breaches

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Table of Contents. Application Vulnerability Trends Report Introduction. 99% of Tested Applications Have Vulnerabilities

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Network Test Labs (NTL) Software Testing Services for igaming

Getting started with API testing

How To Test For Security On A Network Without Being Hacked

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

PCI Security Standards Council

Columbia University Web Security Standards and Practices. Objective and Scope

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Threat Model for Mobile Applications Security & Privacy

Testing the OWASP Top 10 Security Issues

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle

HP Security Assessment Services

How the Barracuda Web Application Firewall Secures Your Mobile and IoT Services. Whitepaper

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

How To Make Your Software More Secure

HP Software as a Service. Federated SSO Guide

White Paper. Data Security. The Top Threat Facing Enterprises Today

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

How To Protect Your Mobile Device From Attack

05.0 Application Development

Threat Modeling for Secure Embedded Software

10 Quick Tips to Mobile Security

Workday Mobile Security FAQ

AB 1149 Compliance: Data Security Best Practices

Reducing Application Vulnerabilities by Security Engineering

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide

white SECURITY TESTING WHITE PAPER

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office

Penetration Testing Report Client: Business Solutions June 15 th 2015

Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3

Application Security in the Software Development Life Cycle (SDLC) White Paper

Closing Wireless Loopholes for PCI Compliance and Security

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

New Zealand Company Six full time technical staff Offices in Auckland and Wellington

HP Virtualized Network Protection Service

HP Device Manager 4.6

Transcription:

Report Mobile Application Security Study 2013 report

Table of contents 3 Report Findings 4 Research Findings 4 Privacy Issues 5 Lack of Binary Protection 5 Insecure Data Storage 5 Transport Security 6 Weak Server Side Controls 6 Conclusion 7 Methodology

Overview Do you trust your mobile apps? While users are more mobile than ever, that flexibility has also come with increased risk. As business managers push for more mobile apps, faster development, newer features and broader distribution of these apps, the businesses risk exposure grows exponentially. IT must ensure these apps are secure, even if they are developed by a third party; however, the demand for qualified security experts that understand the mobile vulnerability landscape makes it tougher to keep this expertise in-house. As a result, organizations are at risk of exposing their corporate data, losing brand equity, and ultimately suffering financial loss through breaches of their mobile applications. As computing becomes borderless, adversaries are increasingly bypassing perimeter security and taking advantage of vulnerabilities brought on by the growing number of applications and their unsecured entry points. At the same time, business managers are dramatically increasing the rate of deployment of often rushed to market mobile applications, many of which are, by necessity, developed by third parties. As a result, mobile applications represent a real security threat, emphasizing the need for a mobile application security strategy that enables businesses to go from fast-to-market to secure-and-fast-to-market. Report Findings Enterprise mobile applications sit side by side with dozens, if not hundreds, of consumer mobile apps and stored personal information. This introduces unnecessary exposure that can be easily resolved if the vulnerabilities are identified and addressed prior to releasing an application for deployment. HP Security Research leveraged HP Fortify on Demand (FoD) Mobile to scan more than 2,000 mobile applications from more than 600 companies, revealing alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors. Statistics on apps: Analyzed 2,107 applications published by companies on Forbes list of Global 2000 Applications from 601 different companies Companies located in 50 countries Companies operating in 76 industries Applications from 22 categories, including productivity and social networking 3

Research Findings HP Research tested more than 2,000 mobile applications from 600+ companies 97% of applications tested access at least one private information source of those applications. 86% 75% 18% 71% of applications failed to use simple binary hardening protections against modern-day attacks. of applications do not use proper encryption techniques when storing data on a mobile device. of applications sent usernames and passwords over HTTP, (of the remaining 85%) 18% implemented SSL/ HTTPS incorrectly. of vulnerabilities resided on the Web server. Privacy Issues 97% of applications tested could access at least one private information source With dozens of consumer applications, personal information and enterprise mobile apps on the same device, they appear to act independently; however, without proper security built-in to mobile applications, hidden integration and communication may exist. Should the newest version of the game Mad Mallards have access to text your contact list or sent email? Or actually be able to call a telephone number? What if it wanted to send your contact list to a third party website? We found that a whopping 97% of applications had access to and were able to share this type of data. Worst of all, most of this data is sent off to third party companies over HTTP. In our research, we found banking apps that integrated with social media, chat apps that sent chat logs to be analyzed for future purchasing trends, and many, many applications that track you via geo-location. OWASP Mobile Top Ten Categories: M4 Unintended Data Leakage & M1 Weak Server Side Controls 4

Lack of Binary Protection 86% of applications failed to use simple protections against modern-day attacks Binary protections are a class of easy to implement security protections. In fact, most of them are simple checkboxes you just select before compiling your application and sending it to Apple. Binary protections add more security against modern day exploit and overflow attacks. They also do things like protect your application against attackers who might want to reverse engineer it for piracy. In other cases they are simple best practices that reduce the information your application might normally share. Things like Position-Independent Executable (PIE), stack smashing protection, symbol stripping, code obfuscation, path disclosure, jailbreak detection, etc., are all lumped into this category. In this study, we found an alarming number of applications did not implement these easy to use security protections. OWASP Mobile Top Ten Categories: M10 Lack of Binary Protections Insecure Data Storage 75% of applications do not use proper encryption techniques when storing data on a mobile device Any stored data that is accessible from a mobile application can be a target if the data is stored without encryption. Such data includes passwords, personal information, session tokens, documents, chat logs, photos, etc. Most consumers think that data is protected by their pin number, but that is a false assumption. This 75% represents data that is accessible to anyone who has an unlocked powered on phone in their possession. Unencrypted data that is seen and used for malicious purposed by an attacker can violate numerous policies in a corporation s governance as well as compromise the reputation of the enterprise if sensitive trade secrets are leaked to competitors, or the media. The simple fact is, losing your phone is equal to losing your high valued data. OWASP Mobile Top Ten Categories: M2 Insecure Data Storage & M4 Unintended Data Leakage Transport Security 18% of applications sent usernames and passwords over HTTP, while another 18% implemented SSL/HTTPS incorrectly We found too many mobile applications transported things like passwords and registration data over HTTP. This is a very insecure process further compounded by the fact that these credentials are not just for the mobile application but are often also used by their Web application counterparts. Not only were the application s credentials themselves at risk, but any social media sites they integrated with often used that social media sites HTTP endpoint rather than the HTTPS one. What does this mean? Anyone with a malicious mind on your same network (think coffee shop, work Wi-Fi, airport, or any server between you and a very far away website) can sniff your data. What s even more interesting is that many of those who did use SSL/HTTPS managed to use it incorrectly, allowing certificate vulnerabilities that made it just as possible to perpetrate a man-in-the-middle attack like in the scenario above. OWASP Mobile Top Ten Categories: M3 Insufficient Transport Layer Protection 5

Weak Server Side Controls 71% of vulnerabilities resided on the Web server It our earnest belief that the pace and cost of development in the mobile space has hampered security efforts. As a community (especially organizations like OWASP) we have been fighting Web-based vulnerabilities for the last fifteen years. With the advent of mobile flexibility we have lost sight of the fact that these mobile apps have Web back ends. We are forgetting these servers need security attention as well and as a result we see the most critical flaws existing on these mobile sites/api s/web services. We also see a resurgence of a lack of knowledge when it comes to Web service or API security, which we think is correlated to the use of frameworks or development shops that have no security incentives. OWASP Mobile Top Ten Categories: M1 Weak Server Side Controls Conclusion As these statistics show, mobile application security is still in its infancy. Just like with their Web counterparts, first comes the technology, and then comes the security. There are certain actions organizations can take immediately, though, to catch up to the pace of innovation. Scan your applications This is important for a variety of reasons. First, it s simple to implement. When you have no existing security program in place, this is where to start. Secondly, automated scanning casts a wide net, which is necessary when both simple and complex mobile application security mistakes are being made. Automated scanning solutions are capable of submitting far more tests in a far shorter time frame than humans could hope to do. Finally, automated scanning solutions have security expertise built in, something not always easy for organizations to acquire. Implement penetration testing By design, security scanners look for as many vulnerabilities as possible. That does create false positives, or things that aren t truly vulnerabilities. That s simply the nature of scanners, and a far preferable behavior to False Negatives (missing an existing vulnerability entirely). Penetration testing helps separate the wheat from the chaff of automated scanning solutions. By manually reviewing results and examining interesting findings in an in-depth manner automated scanners can t match, penetration testing provides verified findings and much more reliable results. As well, many low level vulnerabilities are stepping stones to escalate methods of attacks. Penetration testers can quickly determine whether vulnerabilities found by scanners are really low level or need immediate attention. Adopt a Secure Coding Development Lifecycle (SDLC) approach There are several approaches that try to protect around mobile application vulnerabilities such as Mobile Device Management (MDM), Mobile Application Management (MAM), Mobile Information Management (MIM), etc. However, the only true solution is to find and fix the problems in the code itself. These solutions can be a great extra-layer of defense, sure, but absolutely shouldn t be used in the stead of remediating the underlying issues. While implementing secure coding practices takes the longest to implement, this step ultimately bears the most fruit. Long story short, it s exponentially less expensive to build security into the development process than adding it to mobile applications already in production. Ultimately, it s about baking security in, not brushing it on. 6

Methodology The analysis run in this study featured new technologies created by Fortify on Demand engineers to quickly assess the security posture of a mobile application. This automated Binary and Dynamic analysis engine is employed in Fortify on Demand s Mobile. FoD Mobile is designed to give corporations a look into any mobile apps privacy and security flaws, while remaining low cost, requiring less time, and not requiring source code. Whether you have a new app you ve developed, an app you contracted out, or an app you are thinking about allowing into your organization, FoD Mobile gives you the information to make security decisions quickly and easily. The data polled for the study only used a subset of data gathered from FoD Mobile. Findings such as SQL injection, specifics of files using bad encryption, dangerous logging, several caching vulnerabilities, inter-app communication vulnerabilities, Unique Device Identifier (UDID) leakage, weak cryptography implementations, etc., were withheld as not to reveal specific egregious security flaws. While the scope of the FoD Mobile technology used these analyses is mostly client based, Fortify on Demand used its 2013 Premium Assessment data to run statistical analysis on mobile server side issues. Premium Mobile Assessments offer an in-depth look into the source code, running application, and Web server domains. This service level is akin to manual penetration testing and powered by some of the brightest mobile security minds in the industry. Learn more at hp.com/go/fortifymobile Sign up for updates hp.com/go/getupdated Rate this document Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. 4AA5-1057ENW, February 2014