Explore the Latest in Tech Innovations

Please enable JavaScript in your browser to complete this form.
Name

92% of Google Play Store’s 650 Most Popular Fintech Apps Expose Exploitable Secrets

Mar 3, 2023 | News

SOURCE: Approov

New analysis from Approov show that ninety two percent of the most popular banking and financial services apps on the Google Play Store contain easy-to-extract secrets (such as API keys), which could be used by cyber attackers in scripts and bots to steal data, devastating consumers and the institutions they trust.

The study “Mobile App Security Report – Exposing the Security Vulnerabilities of Top Finance Apps” (link is at bottom) summarizes the work of the Approov Mobile Threat Lab. The team downloaded, decoded and scanned the top 200 financial services apps in the U.S., U.K., France and Germany, investigating a total of 650 unique apps.

Only 5% of the apps examined had good defenses against runtime attacks manipulating the device environment and only 4% were well protected against Man-in-the-Middle (MitM) attacks at run-time. As well as immediately exposing secrets, scans also indicated two critical runtime attack surfaces that could be used to steal API keys at runtime.

“Have we all unknowingly become beta-testers for financial services apps? Is this putting our personal finances at risk? Continuing news about breaches seems to indicate this is the case,” said Approov CEO Ted Miracco.

  • https://x.com/ITBriefcase
  • LinkedIn

Other findings:

– None of the 650 apps “ticked all the boxes” in terms of the three attack surfaces investigated. All failed in at least one category.

– Only four apps had runtime protection against channel MitM attacks and “man-in-the-device.” All were payment and transfer apps and none with such protections were in the U.S.

– In general, apps deployed in Europe were better protected than apps available only in the U.S., for immediate secret exposure and runtime protections.

– Crypto apps were more likely to leak sensitive secrets as 36% immediately offered highly sensitive secrets when scanned.

– 18% of personal finance apps leaked sensitive information, possibly because they are less dependent on sensitive APIs.

– For Man-in-the-Device attacks, traditional banks’ mobile apps are twice as likely to be well protected over other sectors reflecting the use of packers and protectors to protect against run-time manipulation.  

“This research shows hardcoding sensitive data in mobile apps is widespread and a massive problem since secrets can easily be extracted. A simple automated scan can show any threat actor how well protected apps are at runtime. Unfortunately, financial apps fall short,” Miracco added.

The Approov Mobile Threat Lab report is available here (https://info.approov.io/secret-report).

The report explains the approach and provides detailed findings, allowing financial services teams to replicate tests performed and check the security of their apps.

Click here to view more IT Briefcase content!

How new data privacy laws will impact you

How new data privacy laws will impact you

The 2025 Data Privacy Crisis: 8 New Laws Create Compliance Emergency
January 2025 brought unprecedented privacy upheaval as eight new state laws activated simultaneously, affecting businesses nationwide. With non-compliance costs averaging $14.82 million and 94% of consumers refusing to buy from companies that mishandle data, the stakes have never been higher. From mandatory universal opt-out mechanisms to AI governance challenges, organizations face a regulatory maze that could trigger automatic violations. Tennessee, Minnesota, and Maryland follow with even stricter requirements mid-year. Discover critical compliance strategies, technical implementation requirements, and personal VPN protection benefits to navigate 2025’s most complex privacy landscape and avoid costly penalties.

read more
The Quantum Readiness Survey: How Technology Leaders Are Preparing for the Next Computing Revolution

The Quantum Readiness Survey: How Technology Leaders Are Preparing for the Next Computing Revolution

Quantum computing is no longer a distant scientific curiosity—it’s rapidly approaching commercial reality. From breaking current encryption methods to solving optimization problems that could transform entire industries, quantum computing represents both unprecedented opportunity and significant risk for enterprise organizations. Be a part of the future, take part 1 of the Quantum Computing survey

read more
Your Monthly Tech Intelligence Briefing – May 26, 2025 – Memorial Day Edition

Your Monthly Tech Intelligence Briefing – May 26, 2025 – Memorial Day Edition

Securing Multi-Cloud Environments: Best Practices for 2025
As we honor those who served our nation this Memorial Day, it’s fitting to reflect on the strategic importance of defending our digital infrastructure. Just as military operations require coordinated defense across multiple fronts, modern enterprises must secure their multi-cloud environments with the same level of strategic planning and execution.

read more
Share This