Home > Cyber News > 76 iOS Apps Expose Sensitive User Information in MiTM Attacks

76 iOS Apps Expose Sensitive User Information in MiTM Attacks

According to Will Strafach, CEO of Sudo Security Group, a number of iOS apps that are supposed to encrypt user data don’t do it accurately, and are thus exposing their users.

The researcher has uncovered 76 iOS apps vulnerable to attacks that intercept protected data. It appears that the developers of these apps have misconfigured the networking-related code. The result is that the code will accept an invalid TLS certificate, the researcher claims.

I was able to confirm 76 popular iOS applications allow a silent man-in-the-middle attack to be performed on connections which should be protected by TLS (HTTPS), allowing interception and/or manipulation of data in motion,” Strafach says.

This attack could be carried out by any party within Wi-Fi range of a device which the device is being used. This could happen while the target is in public or at home.

Related: How to Bypass Apple’s iOS Activation Lock on iPhone and iPad

76 Apps Deemed Vulnerable, 43 of Which Medium to High Risk

The vulnerability is found in 76 apps, and was found via scanning the apps with the researcher’s company-developed security service, verify.ly. Obviously, his report is also a kind of self-promotion. Strafach also claims that 43 of the these apps were either a high or medium risk, as they could expose login details and authentication tokens. Also, some of the apps belong to “banks, medical providers, and other developers of sensitive applications,” he claimed. These particular apps haven’t been revealed.

Related: MacDownloader Malware Written by Iranian State Hackers Tracks Activists

The other 33 apps were identified as low risks as they exposed only partially sensitive data, like email addresses. Some of these apps are the free messaging service ooVoo, video uploaders to Snapchat and not-so-popular music streaming services.

Overall, all of the 76 apps have been downloaded 18 million times, at least according to data by app market tracker Apptopia. To fix the issue, app developers will only have to change a few lines of code, the researcher concluded. He has been trying to contact the devs.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *