SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
THE MOBILE
ATTACK SURFACE
Copyright © 2017 Accenture
All rights reserved.
Accenture, its logo, and
High Performance Delivered are
trademarks of Accenture. 172091
SECURITY
CHALLENGES
FOR BANKS
According to analysis and estimates by NowSecure, Inc. (NowSecure):1
The proliferation of mobile devices,
applications (apps) and operating systems
continues to drive innovation and expand the
mobile ecosystem. However, this continued
expansion may also create unique security
risks around the storage and transmission of
sensitive information via mobile devices.
ATTACK SURFACE: THE DEVICE ATTACK SURFACE: THE NETWORK
ATTACK SURFACE: THE DATA CENTER
• Wi-Fi (No Encryption/Weak Encryption)
• Rogue Access Point
• Packet Sniffing
• Man-in-the-Middle (MITM)
• Session Hacking
• DNS (Domain Name System) Poisoning
• SSL (Secure Sockets Layer) Strip
• Fake SSL Certificate
WEB SERVER
• Platform Vulnerabilities
• Server Misconfiguration
• Cross-Site Scripting (XSS)
• Cross-Site Request Forgery (XSRF)
• Weak Input Validation
• Brute Force Attacks
DATABASE
• SQL Injection
• Privilege Escalation
• Data Dumping
• OS Command Execution
BROWSER
• Phishing
• Framing
• Clickjacking
• Man-in-the-Middle
• Buffer Overflow
• Data Caching
PHONE/SMS
• Baseband Attacks
• SMishing
MALWARE
SYSTEM
• No Passcode/
Weak Passcode
• iOS® Jailbreak
• Android™ Rooting
• OS Data Caching
• Passwords and
Data Accessible
• Carrier-Loaded
Software
• No Encryption/
Weak Encryption
• User-Initiated Code
APPS
• Sensitive Data
Storage
• No Encryption/
Weak Encryption
• Improper SSL
Validation
• Config Manipulation
• Dynamic Runtime
Injection
• Unintented
Permissions
• Escalated Privileges
There are three areas in the mobile technology chain where
parties may exploit vulnerabilities to launch malicious attacks;
the device, the network and the data center.2
FOR MORE INFORMATION, VISIT:
Accenture Finance and Risk:
www.accenture.com/financeandrisk
Accenture Security:
www.accenture.com/us-en/security-index
REFERENCES
1. Secure Mobile Development Best Practices,” NowSecure. Access at:
https://www.nowsecure.com/ebooks/secure-mobile-development-be
st-practices/.
2. Ibid
3. Mobile Banking Applications: Security Challenges for Banks,
Accenture and NowSecure, April 2017.
Copyright © NowSecure, Inc. All rights reserved.
The NowSecure name and logo are trademarks of
NowSecure, Inc. and are used with permission.
Rights to trademarks referenced herein, other than
Accenture trademarks, belong to their respective
owners. We disclaim proprietary interest in the
marks and names of others.
35 PERCENT
of communications sent
by mobile devices are
unencrypted and the average
device connects to over
160 unique IP addresses daily.
As mobile devices continue to
replace legacy hardware across
organizations and industries, it
is critical that security remains
top-of-mind and is embedded
within the app development
lifecycle. With this in mind,
Accenture and NowSecure
collaborated to analyze the
mobile threat landscape,
specifically for customer-facing
mobile banking apps.
ONE IN FOUR
mobile apps include at least
one high-risk security flaw.
43 PERCENT
of mobile device users do
not use a passcode, PIN or
pattern lock on their devices.
TOP SECURITY
RISKS FOR MOBILE
BANKING APPS
To assess the security of mobile banking apps against fraud and
penetration attempts, static and dynamic analysis was performed
using the NowSecure Lab Automated tool. The vulnerability
assessment included customer-facing mobile banking apps from
15 unique North American financial institutions on both iOS® and
Android™ operating systems (30 total apps).
All apps included in scope were publicly available and downloaded directly from
the respective online app stores. A total of 780 tests were performed across the
apps in scope. Overall, every app tested had at least one security issue.3
The top
risks identified appear below.
Applications running on
Android™ Operating System
Applications running on
iOS® Operating System
WORLD-WRITABLE FILES
CVSS 7.7 – 33%
WRITABLE EXECUTABLES
CVSS 7.7 – 7%
BROKEN SSL (SECURE SOCKETS
LAYER) & SENSITIVE DATA IN
TRANSIT (WITH ENCRYPTION)
CVSS 7.4 – 13%
OBFUSCATION
CVSS N/A – 60%
SECURERANDOM
CVSS 5.5 – 73%
COOKIE “HTTPONLY” TAG
CVSS 5.3 – 40%
TLS (TRANSPORT LAYER
SECURITY) TRAFFIC WITH
SENSITIVE DATA
CVSS 1.6 – 80%
APP TRANSPORT SECURITY
CVSS N/A – 60%
DYNAMIC CODE LOADING
CVSS 4.3 – 33%
IMPACT VULNERABILITY SCALE:
Low
Medium
High
BANKING
MOBILE
APPLICATIONS
EMBEDDING
SECURITY IN MOBILE
DEVELOPMENT
LIFECYCLE
The mobile development field is a complex environment that is
constantly evolving, which creates a hyper-dynamic environment
for developers. These complexities often increase the attack surface,
with mobile devices constantly challenging the boundaries of an
organization’s security perimeter. Mobile apps should, at a minimum, be
developed with the same security standards as any other software asset.
Accenture has identified key principles to help organizations develop a comprehensive
program for embedding security throughout the enterprise’s mobile lifecycle.
Developing a strategy, grounded by six (6) key principles, allows banks to proactively
address security vulnerabilities throughout the mobile development lifecycle and
promote informed decisions around security risks.
Leading organizations recognize the expansion of mobile technologies within their
enterprise and proactively seek ways to securely integrate them to further enable
their workforce and achieve business goals by:
4. Understanding the impact
across the organization
and the processes needed
to support it.
2. Identifying the resources
and systems that are affected
by the introduction of mobile
technologies.
3. Selecting the technologies
and implementing controls to
meet requirements defined
by business needs as well as
compliance requirements.
1. Developing a mobile
security strategy to properly
integrate with the overall
security and business strategy.
1. DEVICE 2. NETWORK
3. DATA 4. APPLICATION
5. USER ACCESS 6. GOVERNANCE & COMPLIANCE
TOP RISKS IDENTIFIED AND CVSS
COOKIE “SECURE” TAG
CVSS 5.3 – 54%
CVSS: Common Vulnerability Scoring System

Más contenido relacionado

Más de accenture

The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023accenture
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operationsaccenture
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Studyaccenture
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023accenture
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented changeaccenture
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% meaccenture
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023accenture
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoaccenture
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industryaccenture
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023accenture
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accentureaccenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accentureaccenture
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chainaccenture
 
Chemical Companies in the Metaverse
Chemical Companies in the MetaverseChemical Companies in the Metaverse
Chemical Companies in the Metaverseaccenture
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chainaccenture
 
Value Untangled Slideshare
Value Untangled SlideshareValue Untangled Slideshare
Value Untangled Slideshareaccenture
 
The Industrialist: Trends & Innovations - November 2022
The Industrialist: Trends & Innovations - November 2022The Industrialist: Trends & Innovations - November 2022
The Industrialist: Trends & Innovations - November 2022accenture
 
Health Experience: The difference between loyalty & leaving
Health Experience: The difference between loyalty & leavingHealth Experience: The difference between loyalty & leaving
Health Experience: The difference between loyalty & leavingaccenture
 
The Reinvention Reset | Accenture
The Reinvention Reset | AccentureThe Reinvention Reset | Accenture
The Reinvention Reset | Accentureaccenture
 
Metaverse opportunities for the communications industry
 Metaverse opportunities for the communications industry Metaverse opportunities for the communications industry
Metaverse opportunities for the communications industryaccenture
 

Más de accenture (20)

The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chain
 
Chemical Companies in the Metaverse
Chemical Companies in the MetaverseChemical Companies in the Metaverse
Chemical Companies in the Metaverse
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chain
 
Value Untangled Slideshare
Value Untangled SlideshareValue Untangled Slideshare
Value Untangled Slideshare
 
The Industrialist: Trends & Innovations - November 2022
The Industrialist: Trends & Innovations - November 2022The Industrialist: Trends & Innovations - November 2022
The Industrialist: Trends & Innovations - November 2022
 
Health Experience: The difference between loyalty & leaving
Health Experience: The difference between loyalty & leavingHealth Experience: The difference between loyalty & leaving
Health Experience: The difference between loyalty & leaving
 
The Reinvention Reset | Accenture
The Reinvention Reset | AccentureThe Reinvention Reset | Accenture
The Reinvention Reset | Accenture
 
Metaverse opportunities for the communications industry
 Metaverse opportunities for the communications industry Metaverse opportunities for the communications industry
Metaverse opportunities for the communications industry
 

Último

212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technologyz xss
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economiccinemoviesu
 
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)ECTIJ
 
Bladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证jdkhjh
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Sonam Pathan
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办fqiuho152
 
2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGeckoCoinGecko
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppmiss dipika
 
Stock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfStock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfMichael Silva
 
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...Amil baba
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojnaDharmendra Kumar
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasCherylouCamus
 
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACTGOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACTharshitverma1762
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfMichael Silva
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithAdamYassin2
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Sonam Pathan
 
(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一
(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一
(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一S SDS
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Commonwealth
 

Último (20)

212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economic
 
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
 
Bladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results Presentation
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
 
Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024
 
2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsApp
 
Stock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfStock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdf
 
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojna
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng Pilipinas
 
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACTGOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdf
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam Smith
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
 
(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一
(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一
(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]
 

Mobile Banking Applications: Security Challenges Infographic

  • 1. THE MOBILE ATTACK SURFACE Copyright © 2017 Accenture All rights reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. 172091 SECURITY CHALLENGES FOR BANKS According to analysis and estimates by NowSecure, Inc. (NowSecure):1 The proliferation of mobile devices, applications (apps) and operating systems continues to drive innovation and expand the mobile ecosystem. However, this continued expansion may also create unique security risks around the storage and transmission of sensitive information via mobile devices. ATTACK SURFACE: THE DEVICE ATTACK SURFACE: THE NETWORK ATTACK SURFACE: THE DATA CENTER • Wi-Fi (No Encryption/Weak Encryption) • Rogue Access Point • Packet Sniffing • Man-in-the-Middle (MITM) • Session Hacking • DNS (Domain Name System) Poisoning • SSL (Secure Sockets Layer) Strip • Fake SSL Certificate WEB SERVER • Platform Vulnerabilities • Server Misconfiguration • Cross-Site Scripting (XSS) • Cross-Site Request Forgery (XSRF) • Weak Input Validation • Brute Force Attacks DATABASE • SQL Injection • Privilege Escalation • Data Dumping • OS Command Execution BROWSER • Phishing • Framing • Clickjacking • Man-in-the-Middle • Buffer Overflow • Data Caching PHONE/SMS • Baseband Attacks • SMishing MALWARE SYSTEM • No Passcode/ Weak Passcode • iOS® Jailbreak • Android™ Rooting • OS Data Caching • Passwords and Data Accessible • Carrier-Loaded Software • No Encryption/ Weak Encryption • User-Initiated Code APPS • Sensitive Data Storage • No Encryption/ Weak Encryption • Improper SSL Validation • Config Manipulation • Dynamic Runtime Injection • Unintented Permissions • Escalated Privileges There are three areas in the mobile technology chain where parties may exploit vulnerabilities to launch malicious attacks; the device, the network and the data center.2 FOR MORE INFORMATION, VISIT: Accenture Finance and Risk: www.accenture.com/financeandrisk Accenture Security: www.accenture.com/us-en/security-index REFERENCES 1. Secure Mobile Development Best Practices,” NowSecure. Access at: https://www.nowsecure.com/ebooks/secure-mobile-development-be st-practices/. 2. Ibid 3. Mobile Banking Applications: Security Challenges for Banks, Accenture and NowSecure, April 2017. Copyright © NowSecure, Inc. All rights reserved. The NowSecure name and logo are trademarks of NowSecure, Inc. and are used with permission. Rights to trademarks referenced herein, other than Accenture trademarks, belong to their respective owners. We disclaim proprietary interest in the marks and names of others. 35 PERCENT of communications sent by mobile devices are unencrypted and the average device connects to over 160 unique IP addresses daily. As mobile devices continue to replace legacy hardware across organizations and industries, it is critical that security remains top-of-mind and is embedded within the app development lifecycle. With this in mind, Accenture and NowSecure collaborated to analyze the mobile threat landscape, specifically for customer-facing mobile banking apps. ONE IN FOUR mobile apps include at least one high-risk security flaw. 43 PERCENT of mobile device users do not use a passcode, PIN or pattern lock on their devices. TOP SECURITY RISKS FOR MOBILE BANKING APPS To assess the security of mobile banking apps against fraud and penetration attempts, static and dynamic analysis was performed using the NowSecure Lab Automated tool. The vulnerability assessment included customer-facing mobile banking apps from 15 unique North American financial institutions on both iOS® and Android™ operating systems (30 total apps). All apps included in scope were publicly available and downloaded directly from the respective online app stores. A total of 780 tests were performed across the apps in scope. Overall, every app tested had at least one security issue.3 The top risks identified appear below. Applications running on Android™ Operating System Applications running on iOS® Operating System WORLD-WRITABLE FILES CVSS 7.7 – 33% WRITABLE EXECUTABLES CVSS 7.7 – 7% BROKEN SSL (SECURE SOCKETS LAYER) & SENSITIVE DATA IN TRANSIT (WITH ENCRYPTION) CVSS 7.4 – 13% OBFUSCATION CVSS N/A – 60% SECURERANDOM CVSS 5.5 – 73% COOKIE “HTTPONLY” TAG CVSS 5.3 – 40% TLS (TRANSPORT LAYER SECURITY) TRAFFIC WITH SENSITIVE DATA CVSS 1.6 – 80% APP TRANSPORT SECURITY CVSS N/A – 60% DYNAMIC CODE LOADING CVSS 4.3 – 33% IMPACT VULNERABILITY SCALE: Low Medium High BANKING MOBILE APPLICATIONS EMBEDDING SECURITY IN MOBILE DEVELOPMENT LIFECYCLE The mobile development field is a complex environment that is constantly evolving, which creates a hyper-dynamic environment for developers. These complexities often increase the attack surface, with mobile devices constantly challenging the boundaries of an organization’s security perimeter. Mobile apps should, at a minimum, be developed with the same security standards as any other software asset. Accenture has identified key principles to help organizations develop a comprehensive program for embedding security throughout the enterprise’s mobile lifecycle. Developing a strategy, grounded by six (6) key principles, allows banks to proactively address security vulnerabilities throughout the mobile development lifecycle and promote informed decisions around security risks. Leading organizations recognize the expansion of mobile technologies within their enterprise and proactively seek ways to securely integrate them to further enable their workforce and achieve business goals by: 4. Understanding the impact across the organization and the processes needed to support it. 2. Identifying the resources and systems that are affected by the introduction of mobile technologies. 3. Selecting the technologies and implementing controls to meet requirements defined by business needs as well as compliance requirements. 1. Developing a mobile security strategy to properly integrate with the overall security and business strategy. 1. DEVICE 2. NETWORK 3. DATA 4. APPLICATION 5. USER ACCESS 6. GOVERNANCE & COMPLIANCE TOP RISKS IDENTIFIED AND CVSS COOKIE “SECURE” TAG CVSS 5.3 – 54% CVSS: Common Vulnerability Scoring System