Mobile banking apps in developing nations have weak security

Attackers could already be using software vulnerabilities to steal money

Mobile banking apps in developing countries have a variety of software flaws that could pose risks to consumers, according to a new research paper.

Mobile banking apps in developing countries have a variety of software flaws that could pose risks to consumers, according to a new research paper.

The developing world is increasingly using mobile banking apps to move money, but new research shows those apps are often poorly coded and pose security risks.

Researchers with the University of Florida looked at dozens of apps used for mobile money systems but extensively analyzed seven that have millions of users in Brazil, India, Indonesia, Thailand, and the Philippines.

The problems they found represent a large attack surface, including SSL/TLS issues, botched cryptography, information leakage and opportunities to manipulate transactions and modify financial records.

The impact of the problems is unknown, but "it is possible that these apps are already being exploited in the wild, leaving consumers with no recourse to dispute financial transactions," according to their research paper, to be presented on Wednesday at the 24th USENIX Security Symposium in Washington, D.C.

So-called "branchless" banking systems using mobile apps have revolutionized banking in developing countries, where the poor have long suffered from difficult access to traditional banking systems, they wrote.

In some countries, branchless banking apps are used for 30 percent of some nations' GDP, relying on the near universal deployment of cellular network and mobile devices.

The apps can let people send money to others, pay their bills, check account balances and buy airtime credits.

While the convenience is unparalleled for the developing world, the research paper shows that security is often lagging. Complicating the problem is that the terms of service for many services shift the liability to customers if there's a problem, they wrote.

"Providers must not marry such vulnerable systems with a liability model that refuses to take responsibility for the technical flaws, and these realities could prevent sustained growth of branchless banking," they wrote.

One app in India called the Oxigen Wallet is vulnerable to a man-in-the-middle attack. Poor authentication and cryptography could allow an attacker to compromise an Oxigen account and conduct unauthorized transactions.

GCash, used in the Philippines, uses a static encryption key when communicating with a remote server. A user's PIN and session ID are encrypted with the key, which is public, before being sent.

"An attacker with this key can decrypt the user's PIN and session ID if the encrypted data is captured," they wrote. "This can subsequently give the attacker the ability to impersonate the user."

They also found problems with Airtel Money and MoneyOnMobile, both used in India, mPAY of Thailand, Zuum of Brazil and mCoin of Indonesia.

All of the services were notified of the vulnerabilities before the publication deadline of the research paper, they wrote.

"Most have not sent any response to our disclosures," the paper said. "We have chosen to publicly disclose these vulnerabilities in this paper out of an obligation to inform users of the risks they face in using these insecure services."

The paper was co-authored by Bradley Reaves, Nolen Scaife, Adam Bates, Patrick Traynor and Kevin R.B. Butler.

Send news tips and comments to Follow me on Twitter: @jeremy_kirk

Join the CSO newsletter!

Error: Please check your email address.

Tags USENIXsecuritymobile securityUniversity of Florida

More about Twitter

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jeremy Kirk

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place