Avoid mobile cybersecurity threats by checking the source
|Sam Bakken in Security Thursday, July 5, 2018|
Always check the source of your mobile app download. Mobile third-party app stores are littered with malicious software that wants nothing more than to mine cryptocurrency on your phone while you're not looking.
Earlier this month IT news organizations around the globe reported that Epic Games’ popular Fortnite game was being counterfeited and malicious actors were, in fact, lacing the imposter apps with malware.
We’re only human, and people unwittingly let their guard down in anticipation of something they're passionate about, or when they think they might be getting a bargain or exclusive access to something before everyone else. In the end, if something seems too good to be true - an advanced copy of a popular game via unofficial channels before it's available to the public for instance - it probably is.
Fortnite has a massive fan following. They have created a frenzy of excitement by moving their extremely popular online shooter game to iOS mobile devices. Of course, Android users don’t like being left behind and attackers see the hole in the Android market as an opportunity to target users trying to get in on the action
This has led to an influx of fake Android apps that are hoodwinking users. In this latest case, users download these imposter apps hoping to join in on the Fortnite fun, but instead, they are asked to download a bunch of apps in order to unlock the game but are never actually granted access. Earlier in May, security researchers identified a number of Fortnite imposter apps for Android that actually accessed device cameras, harvested personal information, recorded audio, or mined cryptocurrency. Unfortunately, imposter apps are a serious risk that people, especially those of us that have trouble delaying gratification must be wary of when it comes to mobile apps we use, or really want to use each day.
Hackers like to take advantage when real applications have not been released yet, or when a new feature is expected to be released but has not quite made it to the market. In general, users should avoid downloading apps from any place other than official stores. Third-party app stores don’t usually apply the same scrutiny to the apps they publish as the Apple App Store or Google Play store will. And even still, there are cases of malicious apps making it onto the official app stores too.
There is also a lesson here for app developers, who should protect their apps and their users against repackaging schemes similar to this recent fake Fortnite debacle. Repackaging is the act of an attacker taking a legit app from the app stores, injecting malicious code into it, and then publishing that repackaged, counterfeit app on an app store.
Fortunately, the situation isn’t hopeless. App shielding technology can detect when an Android or iOS app has been repackaged and prohibit it from executing and compromising a user. Among other defenses, app shielding can also prevent attackers from injecting malicious code into an app as it runs and protects against an attacker reverse-engineering an app to find exploitable vulnerabilities in the app. And perhaps best of all, some app shielding technology can fortify an app post-coding with little to no effort from the development team.
App shielding and hardening add security functionality directly to mobile apps, again in some cases through intuitive portals that don’t require mobile development expertise, for the detection and prevention of application-level intrusions by:
- Proactively shielding applications from malware
- Controlling execution and preventing real-time attacks
- Protecting mobile apps to ensure data and transactions are not compromised
- Maintaining a mobile app’s runtime integrity, even if a user inadvertently downloads malware onto their device
Developers sometimes view security as yet another obstacle to surmount in the face of the ceaseless demand for more features more quickly. App shielding makes security relatively easy for developers and a great opportunity to protect the fruits of their labor and their users. App shielding is only one part of a complete app security program, but it makes mobile app security easier and more efficient so that developers can focus on creating an optimal user experience while also accelerating time-to-market.
The necessary steps to secure your environment for all of the components that are involved in a z Systems cloud infrastructure that uses IBM z/VM and Linux on z Systems.
Write and run code every step of the way, using Android Studio to create apps that integrate with other apps, download and display pictures from the web, play sounds, and more. Each chapter and app has been designed and tested to provide the knowledge and experience you need to get started in Android development.
How to create a profitable, sustainable business developing and marketing mobile apps.
This content is made possible by a guest author, or sponsor; it is not written by and does not necessarily reflect the views of App Developer Magazine's editorial staff.