Close Menu
  • Home
  • Android
  • Android Operating
  • Apple
  • Apps
  • Gadgets
  • Galaxy
  • Ipad
  • IPhone
  • Smartphone
  • Tablet

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Trump’s “All American” gold-plated smartphone promises to rival the iPhone 17.

June 17, 2025

TVOS26 turns your iPhone into a karaoke microphone from Apple Music Sing

June 10, 2025

Muse Dash, Hyperforma, Tower of Fortune 4, etc.

March 28, 2025
Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
Wtf AndroidWtf Android
  • Home
  • Android
  • Android Operating
  • Apple
  • Apps
  • Gadgets
  • Galaxy
  • Ipad
  • IPhone
  • Smartphone
  • Tablet
Wtf AndroidWtf Android
Home » Cloud credentials leaked in plain text within a popular app
Apps

Cloud credentials leaked in plain text within a popular app

adminBy adminOctober 23, 2024No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email


The App Store and Google Play Store are a treasure trove of applications. They themselves regularly provide additional gifts to cybercriminals: hardcoded credentials for AWS and Azure Blob Storage.

This issue was brought up by two researchers from Broadcom’s Symantec Security Technology & Response, Yuanjing Guo and Tommy Dong. “This dangerous activity allows anyone with access to the app’s binaries or source code to extract these credentials and misuse them to manipulate or steal data, potentially leading to serious security breaches. ,” the two said.

This can have serious consequences, including removing or manipulating backend services and exposing proprietary data. In addition, because user data may reside in AWS or Azure Blob Storage, an attacker may be able to misuse credentials to steal user data.

AWS and Azure leaks

As per example, credential leaks are the result of lackluster coding practices. As it turns out, an Android app that has been downloaded 5 million times loads AWS credentials for an Amazon S3 bucket used in production. With minimal significant effort, the app in question loads the staging credentials for app testing.

Elsewhere, app developers are making it even easier for malicious actors to access it. The iOS app, which has 3.9 million ratings and ranks highly in its own category, contains cleartext credentials, including access and private keys. Other apps also connect to AWS via hard-coded credentials, which Symantec researchers have described as a “significant risk.”

AWS breaches are not unique. Azure Blob Storage is also publicly available. Again, incidents involving this service involve hard-coded data within apps that have had millions or hundreds of thousands of downloads. In some cases, it involves a leak in the binary itself, making it easier to detect.

Convenience over safety?

This trend reveals two things. First, the trends identified by Symantec researchers are clear. Apparently, it’s a habit among many app developers to implement credentials this way, as if they were public API keys.

At the same time, there is a lack of standardization as methodologies vary widely. It might contain a connection string with hidden credentials, but it usually contains plaintext data in a binary that should always be under lock and key.

Symantec researchers are calling for a shift to more secure coding techniques. For example, environment variables are loaded at runtime and sensitive credentials are never leaked into the code itself. Additionally, developers can simply leverage the help already provided by AWS (via Secrets Manager) or Microsoft (via Azure Key Vault). Similarly, encryption is often absent when it is painfully obvious that it should be used.

More broadly, code reviews/audits and automated security scanning are clearly lacking. Therefore, Symantec recommends that development teams apply these techniques to detect problems early. In addition, the use of security apps is recommended, and not surprisingly, Symantec recommends Symantec Endpoint Protection to help alleviate the issue.

Also read: Attackers use login credentials to bypass security tools



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

Muse Dash, Hyperforma, Tower of Fortune 4, etc.

March 28, 2025

New Android spyware warning – don’t install these apps

October 31, 2024

Google Apps Finally Adds Material 3 Bottom Bar to Android

October 31, 2024
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Will Google’s new anti-theft feature be a game-changer for Android users?

October 13, 2024

Huawei’s Android replacement HarmonyOS Next launches next week, permanently discontinuing Google’s operating system on existing devices

October 11, 2024

Android 15 lets you turn your phone into a useful smart home dashboard – here’s how

October 11, 2024

Google ordered to open Android app store to competition

October 10, 2024
Top Reviews
Wtf Android
Facebook X (Twitter) Instagram Pinterest Vimeo YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 wtfandroid. Designed by wtfandroid.

Type above and press Enter to search. Press Esc to cancel.