Contact Us
Contact Us
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Subscribe to our newsletter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Securing mobile applications from backdoor passwords

This telecom industry client was planning for an internal mobile application roll out to its staff on a restricted iPad device. This application allows users to connect to their Salesforce CRM modules to fetch, record and update project specific information.

Read more

The Challenge

This telecom industry client was planning for an internal mobile application roll out to its staff on a restricted iPad device. This application allows users to connect to their Salesforce CRM modules to fetch, record and update project specific information.

Defendza were assigned the task to ensure no obvious security risks exist especially related to any third party API communications before going live. 

The Solution

Threat actor simulation scope included reviewing by installing the IPA binary supplied by the client. The application was successfully installed and launched on a jailbroken device indicating the first weakness during this assessment. By allowing an application to be used on a jailbroken device would allow a threat actor to gain insights into internal workings of an application. Further this provides reverse engineering opportunities to gain inside knowledge of the application code. This includes analysing network traffic between the device and the server.

Additionally, it was possible to route the iPad traffic from the consultants laptop. This allowed replaying and fuzzing the API parameters to identify additional vulnerabilities including lack of API throttling on API end-points.

Binary analysis of the iPad app revealed a backdoor password used by internal support team to reset locked user accounts. This password was hard-coded within the binary of the application provided for analysis. 

Upon communication this issue, we were made aware that in-house support team had decided not to develop 'forgotten password' module due to going live deadline pressure. 

Discuss your security concerns with our security experts.
Call Us Now

Lessons Learned

  • Maintain customer image & brand reputation
  • Reveal the existing backdoors hidden by developers
  • Maintain trust amongst your partners and supply chain
  • Demonstrate improved security awareness amongst senior management
  • Enhance the mobile infrastructure security profile
  • Remediation plan including detailed mitigation measures

Resources