iTnews

Reading between the lines of security alerts

By Juha Saarinen on Aug 12, 2014 2:12PM
Reading between the lines of security alerts

[Blog post] What does it actually tell you?

Wading through daily security alerts can be confusing to security adminstrators who need to ascertain the actual potential impact of any threat.

Take last week’s alert about Apache Cordova (or Adobe PhoneGap), an app development framework which contains a remotely exploitable security flaw affecting Android banking apps - the security alert issued by IBM’s X-Force leaves one with more questions than answers.

Make no mistake: the security flaw is real, and the Apache Foundation and IBM have distributed patches against it and rate it as serious.  

Cordova is found in 6 percent of all Android apps, according to Android app directory AppBrain, which IBM says puts "millions of users” at risk of credentials theft. 

If AppBrain’s stats are correct, as many as 77,000 vulnerable Google Play apps could require patching.

And if any of those apps are popular, it could mean millions of users have a security headache on the horizon.

But the extent to which that is the case is unclear.

IBM’s X-Force researchers said they found the flaw in 25 apps out of 248 tested by searching for the keyword “bank”.

However, you should not infer that all Android banking apps are at risk - the “bank” search term catches the Piggy Dash and Bank Bomb Police Chase games as well.

Additionally, IBM doesn’t explicitly state it tested only banking apps - so IBM's claim in the security alert that one in 10 Android banking apps are vulnerable is not entirely accurate.

It’s also worth noting that AppBrain lists Cordova as only representing 1.26 percent of the total app downloads from the Google Play Store - which amounts to 17,000 apps.

That's still a big number, but far fewer vulnerable apps than IBM claimed.

According to AppBrain, the Android version of Skype uses Cordova and has been downloaded over 100 million times, as does Amazon’s mobile Android shopping app, which has had over 10 million downloads.

In the finance category - which again has apps downloaded tens of millions of times - Cordova is found in 11 percent of items.

Are all these apps vulnerable? Are patches required? Who knows.

An unkind observer might point to the recent deal between IBM and Apple, which made the former a huge enterprise reseller for the latter, as the reason for Big Blue now sinking the security dagger into Android’s back.

That may be a stretch, but the IBM security alert is curiously narrow when one considers Cordova is cross-platform for iOS, Blackberry, Windows Phone and even Palm’s WebOS, Samsung’s Bada and Nokia’s Symbian.

These non-Android operating systems are not mentioned in the security alert.

Should we assume that’s because the flaw only affects Android and not, devices running iOS? Neil Bergman of Cigital Security identified an iOS flaw in May which appears to have similarities to the one identified by IBM in Cordova. 

The biggest problem with the IBM security alert is that it leaves users without a clear answer as to the vulnerability of their Android apps. IBM should know better.

Got a news tip for our journalists? Share it with us anonymously here.
Tags:
adobeandroidapacheapplecordovaibmiosphonegapsecurityxforce
Juha Saarinen
Juha Saarinen has been covering the technology sector since the mid-1990s for publications around the world. He has been writing for iTnews since 2010 and also contributes to the New Zealand Herald, the Guardian and Wired's Threat Level section. He is based in Auckland, New Zealand. Google
Read more from this blog: SigInt

Partner Content

5 essential digital transformation ideas
Promoted Content 5 essential digital transformation ideas
DoT Victoria turns to Oracle to implement unified cloud-based platform
Promoted Content DoT Victoria turns to Oracle to implement unified cloud-based platform
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Tick off the ransomware bandits
Promoted Content Tick off the ransomware bandits

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Juha Saarinen
Aug 12 2014
2:12PM
0 Comments

Related Articles

  • Apple patches actively exploited macOS Big Sur bug
  • IBM sprays Log4j bugs in security products
  • Emergency patches out for exploited Apple zero-days
  • Third-party bugs squashed in IBM database software
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

NSW digital driver's licences 'easily forgeable'

NSW digital driver's licences 'easily forgeable'

Kmart Australia re-platforms ecommerce site to AWS

Kmart Australia re-platforms ecommerce site to AWS

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

Digital Nation

The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.