Is mobile app data collection a greater threat than mobile malware?

A vendor report found that while mobile malware may receive more attention, unrestrained mobile app data collection actually poses a greater risk to consumers and data security.

This Content Component encountered an error

As increasingly powerful smartphones and other mobile devices have infiltrated enterprise environments in recent years, security professionals have often feared a corresponding rise in mobile malware, similar to what was witnessed on the PC landscape more than a decade ago. But according to a recent report, those worries have largely been unrealized, with mobile app data collection posing a far greater risk to enterprises and users...

.

The report on mobile app reputation, released this month by app analysis vendor Appthority, detailed the widespread collection of data by the current top 100 free and top 100 paid apps on both the Android and iOS mobile platforms. Appthority collected the data for the report by running static, dynamic and behavioral app analysis against all 400 apps in a test environment.

Among free Android apps, 88% of the top 100 apps available on the Google Play store collect data unique device identifiers (UDIDs) or IMEIs, while 82% engage in some form of location tracking and 30% access users' address books. Though Apple often touts iOS as a more secure and privacy-oriented alternative to Android, the Appthority statistics aren't much more flattering for the platform. More than half of the top 100 free apps on the App Store engage in the same UDID and location tracking, and 26% also access users' address books.

Even when users paid for apps, the San Francisco-based firm found that data collection was still prevalent. Out of the top 100 paid Android apps, for instance, 65% still utilized UDID details, 49% collected location data and 14% accessed address books. On the iOS side, 28% used UDIDs, 24% collected location data and 8% accessed address books.

In comparison, out of the 400 apps analyzed, Appthority didn't find a single instance of mobile malware. Only .4% of all apps in enterprise settings contain malware, the company noted, as Apple maintains a strict, manual security review process for all apps entering the iOS App Store and Google employs a variety of tactics to screen Google Play apps for malware.

"Everyone knows about mobile malware," said Appthority President Domingo Guerra in an interview, "but not everyone knows about these other issues."

Data collections risks

Guerra said that mobile app data collection exposes enterprises and users to a number of risks that may not initially be apparent. For example, if a user syncs their corporate Outlook account with a personal smartphone, that device may now have access to an extensive address book that contains contact details for a variety of important figures in the business. If an app that collects that address book information is compromised, attackers could have the information necessary to spam the office phones of those contacts, gather dial-in details for sensitive corporate calls, read attachments in a calendar and more.

Most organizations outside the government aren't overly concerned about location tracking data, said Guerra, though if attackers can glean the location of key executives, they can potentially utilize that information to predict mergers or acquisitions based on visits to relevant businesses. Guerra also noted the famous incident when a U.S. soldier shared a picture on Twitter of himself arriving at a base in  Iraq. The picture included location details via geotagging, he said, which led to insurgents launching a mortar attack on the exact location and destroying the helicopters on base.

And while such behavior by mobile apps alone is cause for concern, Guerra said an equally big risk is posed by the ultimate destination of much of the collected data: ad networks. The report found that among free apps, 71% on the Android platform and 32% on iOS allowed ad networks to collect data. Even among paid apps, 38% on Android and 16% on iOS transferred data to ad networks, and in such cases, Guerra said a user may not even be aware of such data collection practices outside of a privacy policy posted to a developer's website.

The prevalence of mobile ad networks poses multiple risks, according to Guerra. Attackers themselves can pose as ad networks and glean user data directly, compromise an ad network's software development kit and infiltrate an app, or simply target the potentially vast data collection being stored by dozens of ad networks around the world.

"So, from a developer's perspective, the more data we host, the more of a target we can be, and that's definitely the case with advertising networks," said Guerra. "Now that's compounded by the fact that most apps that have an ad network have more than one, so even the developers themselves might not know where all this data is going to end up. From an attacker's perspective, it's not even about finding the most popular ad network -- it's finding the weakest ad network that's still going to have a lot of data."

Next Steps

Need more info on security mobile devices in the enterprise? Read this guide from our sister site SearchConsumerization and reconsider BlackBerry if security is your number one priority.

Dig deeper on Handheld and Mobile Device Security Best Practices

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close