• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

DOJ takes action against 22-year-old running RapperBot Botnet

 | 

Google fixed Chrome flaw found by Big Sleep AI

 | 

Pharmaceutical firm Inotiv discloses ransomware attack. Qilin group claims responsibility for the hack

 | 

A hacker tied to Yemen Cyber Army gets 20 months in prison

 | 

Exploit weaponizes SAP NetWeaver bugs for full system compromise

 | 

Allianz Life security breach impacted 1.1 million customers

 | 

U.S. CISA adds Trend Micro Apex One flaw to its Known Exploited Vulnerabilities catalog

 | 

AI for Cybersecurity: Building Trust in Your Workflows

 | 

Taiwan Web Infrastructure targeted by APT UAT-7237 with custom toolset

 | 

New NFC-Driven Android Trojan PhantomCard targets Brazilian bank customers

 | 

Cisco fixed maximum-severity security flaw in Secure Firewall Management Center

 | 

'Blue Locker' Ransomware Targeting Oil & Gas Sector in Pakistan

 | 

Hackers exploit Microsoft flaw to breach Canada ’s House of Commons

 | 

Norway confirms dam intrusion by Pro-Russian hackers

 | 

Zoom patches critical Windows flaw allowing privilege escalation

 | 

Manpower data breach impacted 144,180 individuals

 | 

U.S. CISA adds Microsoft Internet Explorer, Microsoft Office Excel, and WinRAR flaws to its Known Exploited Vulnerabilities catalog

 | 

Critical FortiSIEM flaw under active exploitation, Fortinet warns

 | 

Charon Ransomware targets Middle East with APT attack methods

 | 

Hackers leak 2.8M sensitive records from Allianz Life in Salesforce data breach

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Hacking
  • Serious security issues in iOS Outlook app Microsoft to access user emails and credentials

Serious security issues in iOS Outlook app Microsoft to access user emails and credentials

Pierluigi Paganini February 03, 2015

A researcher has discovered a series of security issues in the newborn iOS Outlook app that allows Microsoft to access user emails and credentials.

Security researcher and Head of Development at midpoints GmbH and IBM Champion René Winkelmeyer has published a blog post to warn about security issues in the newborn iOS Outlook app. According to the expert, the iOS Outlook app recently presented by Microsoft, allows the company to access corporate emails and server credentials without user’s knowledge.

Winkelmeyer was analyzing how the iOS Outlook app mechanism deals with push notifications and notes when he has discovered that Microsoft could get and store user’s mail account credentials and server data archived in the cloud without notifying users.

When the expert setup the app noticed that it asks users if they want to receive push notifications, so Winkelmeyer decided to test why the app was requesting to receive notification from remote server. Below the test he ran:

  • I stopped the app (removed it from the list of active devices).
  • I sent myself from another account a test mail.
  • I immediately received a push notification about new mail.

The expert speculated that Microsoft is using a central service that manage his credentials and to monitor his ActiveSync account, so he decided to make a second test:

  • I put all my devices in airplane mode. So there could be no communication.
  • I opened the access_log of my Apache server (which sits in front of my Traveler server).
  • There it was!
54.148.96.196 – – [29/Jan/2015:16:19:50 +0100] “POST /traveler/Microsoft-Server-ActiveSync?User=mysupermail%40winkelmeyer.com&DeviceId=123123123123&DeviceType=Outlook&Cmd=Sync HTTP/1.1″ 200 25 “-” “Outlook-iOS-Android/1.0″

This is the proof that Microsoft stores user credentials and server data in its cloud, without notifying it to the final user. They just scan. So they have in theory full access to my PIM data.

“They just scan. So they have in theory full access to my PIM data.” added Winkelmeyer.

The expert noticed also that the iOS Outlook app has always the same ID even if the app is installed by the user on multiple devices, a circumstance that will prevent administrators from distinguish which device is used for the access. Also the iOS Outlook app’s built-in connectors to OneDrive, Dropbox and Google Drive are data security nightmare.

“It gets even more worse. Each ActiveSync client normally has a unique ID for data synchronization. That allows administrators to distinguish a users devices. Microsofts Outlook iOS apps doesn’t work that way. The app shares the same ID across all devices of a user. And it seems like one device!” states the post.

The last element of concern related to the iOS Outlook app are built-in connectors to most popular cloud storage services, including Dropbox, Google Drive and OneDrive, that dramatically enlarge the surface of exposure of the mobile users.

“The app has built-in connectors to OneDrive, Dropbox and Google Drive. That means a user can setup his personal account within the app and share all mail attachments using those services. Or use files from those services within his company mail account. That’s a data security nightmare.” continues Winkelmeyer.

René Winkelmeyer explained that the exposure could not be mitigated by the use of containerized solution like the Apple built-in separation of managed and unmanaged apps. because the communication is app-internal and users cannot control it.iOS Outlook app

In a post update issued, the expert highlighted that Microsoft has bought Acompli company and just “re-branded” their iOS Outllok app inheriting its problems.

These security issues come into the new iOS Outlook app after Microsoft bought mobile email app from Acompli less than two months ago and they have updated their privacy policy (updated on January 28, 2015) that says:

“We provide a service that indexes and accelerates delivery of your email to your device. That means that our service retrieves your incoming and outgoing email messages and securely pushes them to the app on your device.Similarly, the service retrieves the calendar data and address book contacts associated with your email account and securely pushes those to the app on your device. Those messages, calendar events, and contacts, along with their associated metadata, may be temporarily stored and indexed securely both in our servers and locally on the app on your device. If your emails have attachments and you request to open them in our app, the service retrieves them from the mail server, securely stores them temporarily on our servers, and delivers them to the app.”

”If you decide to sign up to use the service, you will need to create an account. That requires that you provide the email address(es) that you want to access with our service. Some email accounts (ones that use Microsoft Exchange, for example) also require that you provide your email login credentials, including your username, password, server URL, and server domain. Other accounts (Google Gmail accounts, for example) use the OAuth authorization mechanism which does not require us to access or store your password.”

Winkelmeyer recommends all administrators to tell employees not to use the iOS Outlook app and block it from accessing their companies’ mail servers,  until Microsoft will not fix the embarrassing issue.

Pierluigi Paganini

(Security Affairs – iOS Outlook,mobile)


facebook linkedin twitter

app cloud storage email hacking privacy iOS Outlook Microsoft mobile

you might also like

Pierluigi Paganini August 20, 2025
Pharmaceutical firm Inotiv discloses ransomware attack. Qilin group claims responsibility for the hack
Read more
Pierluigi Paganini August 20, 2025
A hacker tied to Yemen Cyber Army gets 20 months in prison
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    DOJ takes action against 22-year-old running RapperBot Botnet

    Cyber Crime / August 20, 2025

    Google fixed Chrome flaw found by Big Sleep AI

    Security / August 20, 2025

    Pharmaceutical firm Inotiv discloses ransomware attack. Qilin group claims responsibility for the hack

    Data Breach / August 20, 2025

    A hacker tied to Yemen Cyber Army gets 20 months in prison

    Cyber Crime / August 20, 2025

    Exploit weaponizes SAP NetWeaver bugs for full system compromise

    Security / August 20, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT