Connect with us

Hi, what are you looking for?

APPS

Steps to protect against dating app hacks

Over 60 percent of leading dating mobile apps studied, on the Android mobile platform, are potentially vulnerable to a variety of cyber-attacks that put personal user information and corporate data at risk, finds an analysis conducted by IBM Security.

The IBM study reveals that many of these dating applications have access to additional features on mobile devices such as the camera, microphone, storage, GPS location and mobile wallet billing information, which in combination with the vulnerabilities may make them exploitable to hackers.

IBM also found that nearly 50 percent of organizations have at least one of these employee-installed popular dating apps on mobile devices used to access confidential business information.

In today’s connected culture, dating apps are a common and convenient way for singles of all ages to meet new love interests. In fact, a Pew Research study revealed one in 10 Americans have used a dating site or app and the number of people who dated someone they met online grew to 66 percent over the past eight years.

Advertisement. Scroll to continue reading.

“Many consumers use and trust their mobile phones for a variety of applications. It is this trust that gives hackers the opportunity to exploit vulnerabilities like the ones we found in these dating apps,” said Caleb Barlow, Vice President, IBM Security. “Consumers need to be careful not to reveal too much personal information on these sites as they look to build a relationship with another user on these dating apps. Our research demonstrates that some users may be engaged in a dangerous tradeoff – with increased accessibility resulting in decreased personal security and privacy.”

Security researchers from IBM Security identified that 26 of the 41 dating apps they analyzed on the Android mobile platform had either medium or high severity vulnerabilities. The analysis was done based on apps available in the Google Play app store in October 2014.

The vulnerabilities discovered by IBM Security make it possible for a hacker to gather valuable personal information about a user. While some apps have privacy measures in place, IBM found many are vulnerable to attacks that could lead to the following scenarios:

· Dating App Used for Malware: The anticipation of receiving interest from a potential new date is just the sort of moment, when users let their guard down, that hackers thrive on. Some of the vulnerable apps could be reprogrammed by hackers to send what seems like a message that asks users to click for an update or to retrieve a message that, in reality, is just a ploy to download malware onto their device.

· GPS Information Used to Track Movements: IBM found 73% of the 41 popular dating apps analyzed have access to current and past GPS location information. Hackers can capture a user’s current and past GPS location information to find out where a user lives, works, or spends most of their time.

Advertisement. Scroll to continue reading.

· Steal Credit Card Numbers From App: 48% of the 41 popular dating apps analyzed have access to a user’s billing information saved on their device. Through poor coding, an attacker could gain access to billing information saved on the device’s mobile wallet through a vulnerability in the dating app and steal the information to make unauthorized purchases.

· Take Control of a Phone’s Camera or Microphone: All vulnerabilities identified can allow a hacker to gain access to a phone’s camera or microphone even if the user is not logged into the app. This means, an attacker can spy and eavesdrop on users or tap into confidential business meetings.

· Hacker Can Hijack Your Dating Profile: A hacker can change content and images on the dating profile, impersonate the user and communicate with other app users, or leak personal information externally to affect the reputation of a user’s identity. This poses a risk to other users, as well, since a hijacked account can be used by an attacker to trick other users into sharing personal and potentially compromising information.

Some of the specific vulnerabilities identified on the at-risk dating apps include cross site scripting via man in the middle, debug flag enabled, weak random number generator and phishing via man in the middle. When these vulnerabilities are exploited an attacker can potentially use the mobile device to conduct attacks.

For example, hackers could intercept cookies from the app via a Wi-Fi connection or rogue access point, and then tap into other device features such as the camera, GPS, and microphone that the app has permission to access. They also could create a fake login screen via the dating app to capture the user’s credentials, so when they try to log into a website, the information is also shared with the attacker

Advertisement. Scroll to continue reading.

Steps to protect against dating app hacks

While IBM discovered a number of vulnerabilities in over 60 percent of popular Android dating apps, both consumers and businesses can take steps to protect themselves against potential threats.

What can consumers do?

·  Be Mysterious: Don’t divulge too much personal information on these sites such as where you work, birthday or social media profiles until you’re comfortable with the person you are engaging with via the app.

·  Permission Fitness: Figure out if you want to use an app by checking the permissions it asks for by viewing the settings on your mobile device. When updating, apps often automatically reset the permissions determining what phone features they have access to, like your address book or GPS data.

Advertisement. Scroll to continue reading.

· Keep it Unique: Use unique passwords for every online account you have. If you use the same password for all your accounts it can leave you open to multiple attacks if one account is compromised.

· Punctual Patching: Always apply the latest patches and updates to your apps and your device when they become available. This will fix any identified bugs in your device and applications, resulting in a more secure experience.

· Trusted Connections: Use only trusted Wi-Fi connections when on your dating app. Hackers love using fake Wi-Fi access points that directly connect you to their device instead to execute these types of attacks. Many of the vulnerabilities found in this research can be exploited via Wi-Fi.

What can enterprises do?

Businesses also need to be prepared to protect themselves from vulnerable dating apps active inside their infrastructure. IBM found that nearly 50 organizations, sampled for this research, have at least one popular dating app installed on either both corporate-owned and Bring Your Own Devices (BYOD). To protect confidential corporate assets, businesses should:

Advertisement. Scroll to continue reading.

· Adopt the Right Protection: Leverage Enterprise Mobility Management (EMM) offerings with mobile threat management (MTM) capabilities to enable employees to utilize their own devices while still maintaining the security of the organization.

· Define Downloadable Apps: Allow employees to only download applications from authorized app stores such as Google Play, iTunes, and the corporate app store.

· Education is Key: Educate employees to know the dangers of downloading third party applications and what it means when they grant that app specific device permissions.

· Immediately Communicate Potential Threats: Set automated policies on smartphones and tablets, which take immediate action if a device is found compromised or malicious apps are discovered. This enables protection to corporate resources while the issue is remediated.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

IBM's ASC solution will leverage Amazon Bedrock generative AI technology to automate, evolve and enforce client-chosen security controls quickly.

HEADLINES

As IT leaders grapple with growing technology budgets and managing new generative AI-fueled compute needs, they are facing increasing pressure to prove the value...

HEADLINES

IBM Guardium Data Security Center provides a common view of organizations' data assets, empowering security teams to integrate workflows and address data monitoring and governance,...

HEADLINES

IBM's third-generation Granite flagship language models can outperform or match similarly sized models from leading model providers on many academic and industry benchmarks, showcasing...

White Papers

77% of industry leaders who responded acknowledge that generative AI is necessary to keep pace with competitors.

HEADLINES

Two new solutions, with another expected later this year, bring together the EY organization’s deep industry experience across Tax, Corporate Transactions, IT Financial Management...

HEADLINES

The standards include three post-quantum cryptographic algorithms: two of them, ML-KEM (originally known as CRYSTALS-Kyber) and ML-DSA (originally CRYSTALS-Dilithium) were developed by IBM researchers...

HEADLINES

These innovative solutions use technologies such as the IBM watsonx AI and data platform to enable users — from policymakers at the national and...

Advertisement