AWS accused of scanning Android app in secret key hunt

Powered by SC Magazine
 

Making the cloud safer for all?

Amazon Web Services has been accused of decompiling Android apps to search for secret keys that have been mistakenly hard-coded.

The accusation comes after software developer Raj Bala revealed he had been contacted by AWS advising him to remove his AWS credentials from within an Android application he had developed.

The credentials had as a result become publicly available, as had his AWS Key ID and Secret Key.

"We were recently made aware that an Android application published in the Google Play store contains credentials associated with your AWS account; making those credentials publicly available," AWS told Bala according to his blog, as first reported by The Register.

"This exposure of your AWS credentials within a publicly available Android application could lead to unauthorised use of AWS services, associated excessive charges for your AWS account, and potentially unauthorised access to your data or the data of your application’s users."

He was "strongly" encouraged to invalidate the now publicly-exposed credentials, and use temporary security credentials within applications in the future.

"To help protect our customers, we operate continuous fraud monitoring processes and alert customers if we find unusual activity," AWS told iTnews.

Last week, iTnews reported thousands of AWS secret keys were posted on GitHub, which led to some developers being hit with unexpected bills after unauthorised activity on their accounts. However, AWS refunded the charges.

Update: AWS was alerted to the keys in Bala's code by a third party.

Copyright © iTnews.com.au . All rights reserved.


AWS accused of scanning Android app in secret key hunt
 
 
 
Top Stories
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 320

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 125

Vote