June 5, 2017 By Mark Samuels 2 min read

Developers of many enterprise apps potentially expose sensitive data by failing to properly secure the connection between back-end servers and the app, according to research.

Security firm Appthority used specialist research techniques to analyze the impact of a newly discovered data exposure vulnerability dubbed “HospitalGown.” The vulnerability, which affects hundreds of enterprise apps, is caused when app developers do not secure back-end servers with firewalls and authentication.

Mitigating the vulnerability could be difficult, as the breaches are related to the back-end platforms of vendors. News of the risk should be a timely reminder to IT decision-makers to pay attention to how their data is stored and secured, and how its use is governed.

What Is the Vulnerability?

Appthority’s Mobile Threat Team discovered HospitalGown using back-end scanning as part of its mobile app analysis techniques. The team used the approach to analyze the network traffic of more than 1 million enterprise iOS and Android apps.

Enterprise apps often connect to back-end databases that store user information. Appthority decided to focus its investigation on apps that use Elasticsearch, which is one of the most popular tools used to analyze and mine data stored on back-end servers.

Appthority found 1,000 affected apps on enterprise mobile devices connected to more than 21,000 open Elasticsearch servers, revealing almost 43 TB of exposed data. Detailed research of 39 applications with big data leaks revealed that 163.53 GB of data, or approximately 280 million records, had already been exposed.

Enterprise Apps Left Exposed

SecurityWeek reports that while the connection between the mobile app, its application programming interface and the Elasticsearch data store is typically secure, the Elasticsearch server is often exposed to the internet. The records were accessible because of weakly secured back ends and did not require authentication to access the data.

Leaked data included personally identifiable information such as passwords, location, travel and payment details. The information also included corporate profile data such as emails and phone numbers, as well as retail customer data.

Appthority believes the exposed data could be used to launch further attacks or to conduct fraud. The data could also be sold to other actors for malicious activities. The security firm has reached out to the mobile application developers, app stores and hosting providers associated with the data leaks.

How Can IT Decision-Makers Respond?

Appthority says it named the threat HospitalGown because of the back-end data exposure risk associated with the vulnerability. It says the vulnerability opens organizations to an easy breach, loss of sensitive data, costs associated with remediation, lawsuits and loss of brand trust.

Worse still, according to Dark Reading, mitigation could be difficult. While standard best practice for enterprise mobile security often involves locking down devices, the HospitalGown vulnerability involves unsecured back-end servers, which are a separate route to information. The exposure is difficult for IT teams to detect because the breach occurs on the vendors’ back-end platforms.

The report suggests the vulnerability will only be eliminated by back-end platform configuration improvements and possibly code changes within the affected app. If the vulnerability is related exclusively to back-end systems, then even updating the app will not solve the problem.

Naked Security suggests the vulnerability offers a compelling case for organizations to take a much tighter grip on how mobile data is stored once it leaves users’ devices and enters the cloud. The research is also a timely reminder of the need for IT decision-makers to prepare for the strict compliance associated with the forthcoming EU General Data Protection Regulation (GDPR).

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today