• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

DoNot APT is expanding scope targeting European foreign ministries

 | 

Nippon Steel Solutions suffered a data breach following a zero-day attack

 | 

Iranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliates

 | 

Hackers weaponize Shellter red teaming tool to spread infostealers

 | 

Microsoft Patch Tuesday security updates for July 2025 fixed a zero-day

 | 

Italian police arrested a Chinese national suspected of cyberespionage on a U.S. warrant

 | 

U.S. CISA adds MRLG, PHPMailer, Rails Ruby on Rails, and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog

 | 

IT Worker arrested for selling access in $100M PIX cyber heist

 | 

New Batavia spyware targets Russian industrial enterprises

 | 

Taiwan flags security risks in popular Chinese apps after official probe

 | 

U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog

 | 

Hunters International ransomware gang shuts down and offers free decryption keys to all victims

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 52

 | 

Security Affairs newsletter Round 531 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

North Korea-linked threat actors spread macOS NimDoor malware via fake Zoom updates

 | 

Critical Sudo bugs expose major Linux distros to local Root exploits

 | 

Google fined $314M for misusing idle Android users' data

 | 

A flaw in Catwatchful spyware exposed logins of +62,000 users

 | 

China-linked group Houken hit French organizations using zero-days

 | 

Cybercriminals Target Brazil: 248,725 Exposed in CIEE One Data Breach

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Malware
  • Mobile
  • McAfee Labs Threat Report – many mobile apps still vulnerable

McAfee Labs Threat Report – many mobile apps still vulnerable

Pierluigi Paganini February 25, 2015

The McAfee Labs Threat Report: February 2015 analyzes security level of mobile apps and the evolution of principal cyber threats.

Last year the Carnegie Mellon University’s Computer Emergency Response Team (CERT) analyzed the level of security implemented by Android applications, in particular the experts focused their investigation on Android applications that failed to properly validate SSL certificates. The CERT discovered that more than 20,000 Android apps failed to validate SSL certificates, exposing users vulnerable to MITM attacks. The list of vulnerable applications is reported in a spreadsheet shared by the experts.

Poor programming practices adopted by the development team expose mobile users to a variety of SSL/TLS vulnerabilities such as Heartbleed.

One year later a team of researchers at the McAfee has conducted an interesting study starting from the analysis made in September 2014 by experts at the Carnegie Mellon University.

Unfortunately, nothing is really changed, according to the researchers from McAfee Labs, nearly three-quarters of the 25 most downloaded apps listed in the CERT spreadsheet are still unpatched. According to McAfee Labs Threat Report: February 2015, the experts verified that 18 of the 25 most popular vulnerable apps fail to protect the transmission of users’ credentials.

“Specifically, we dynamically tested the top 25 downloaded mobile apps that had been identified as vulnerable by CERT in September to ensure that usernames and passwords are no longer visible as a result of improper verification of SSL certificates,” read a report issued by McAfee. “To our surprise, even though CERT notified the developers months ago, 18 of the 25 most downloaded vulnerable apps that send credentials via insecure connections are still vulnerable to MITM attacks.”

McAfee Threat Report mobile

The report cites as an example a mobile photo editor, with a number of downloads between 100 million and 500 million, that is still vulnerable to MITM attacks despite the CERT reported the security issues to its development team.

“The most downloaded vulnerable app in this group is a mobile photo editor with between 100 million and 500 million downloads,” the report continues. “The app allows users to share photos on several social networks and cloud services. In late January, McAfee Labs tested the most current version of the app downloaded from Google Play using CERT Tapioca; we were able to intercept the app’s username and password credentials entered to log into the cloud service to share and publish photos.”

McAfee highlights that mobile devices are wide adopted also in the workplace so their security is an important component of the security policy of any enterprise.

“Mobile devices have become essential tools for home to enterprises users as we increasing live our lives through these devices and the applications created to run on them,” explained Vincent Weafer, senior vice president of McAfee Labs. “Digital trust is an imperative for us to truly engage with and benefit from the functionality they can provide. Mobile app developers must take greater responsibility for ensuring that their applications follow the secure programming practices and vulnerability responses developed over the past decade, and by doing so provide the level of protection required for us to trust our digital lives with them.”

The McAfee Labs Threat Report also confirmed a significant increase in the number of mobile malware samples, which increased 14 percent during the fourth quarter of 2014. Another element of interest is the geographic distribution of infections, the highest rates were observed in Asia and Africa. The experts at McAfee revealed that at least eight percent of all McAfee-monitored mobile systems reported an infection in the fourth quarter of 2014.

The Threat Report also identified in the Angler exploit kit, the primary vector used by criminal ecosystem to deliver malicious payloads. After the arrest of the Blacole exploit kit’s author in 2013, criminal crews started to use the Angler exploit kit.

McAfee Threat Report Angler

“An exploit kit is an off-the-shelf software package containing easy-to-use attacks against known and unknown vulnerabilities. Very quickly after the arrest of the Blacole exploit kit’s creator in 2013, cybercriminals migrated to the Angler exploit kit to deliver their payloads. Because Angler is simple to use and widely available through online dark markets, it has become a preferred method to transport malware” states the report.

Let’s close this rapid reading of the McAfee Labs Threat Report with a mention to Potentially Unwanted Programs(PUPs), which are applications that could be used for both legitimate and malicious uses.

“Potentially unwanted programs (PUPs) live in the world between nuisance and malicious malware but are becoming more and more aggressive.”

Enjoy the reading of this interesting report.

Pierluigi Paganini

(Security Affairs –  Mobile, McAfee Labs Threat Report: February 2015)


facebook linkedin twitter

Angler Cybercrime exploit kit malware McAfee McAfee Labs Threat Report mobile mobile apps PUP underground

you might also like

Pierluigi Paganini July 10, 2025
DoNot APT is expanding scope targeting European foreign ministries
Read more
Pierluigi Paganini July 09, 2025
Nippon Steel Solutions suffered a data breach following a zero-day attack
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    DoNot APT is expanding scope targeting European foreign ministries

    APT / July 10, 2025

    Nippon Steel Solutions suffered a data breach following a zero-day attack

    Data Breach / July 09, 2025

    Iranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliates

    Malware / July 09, 2025

    Hackers weaponize Shellter red teaming tool to spread infostealers

    Malware / July 09, 2025

    Microsoft Patch Tuesday security updates for July 2025 fixed a zero-day

    Security / July 08, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT