Menu
Gmail users on iOS at risk of data interception

Gmail users on iOS at risk of data interception

Lacoon Security found Google hasn't yet implemented a security technology that could prevent data loss

Apple users accessing Gmail on mobile devices could be at risk of having their data intercepted, a mobile security company said Thursday.

The reason is Google has not yet implemented a security technology that would prevent attackers from viewing and modifying encrypted communications exchanged with the Web giant, wrote Avi Bashan, chief information security officer for Lacoon Mobile Security, based in Israel and the U.S.

Websites use digital certificates to encrypt data traffic using the SSL/TLS (Secure Sockets Layer/Transport Layer Security) protocols. But in some instances, those certificates can be spoofed by attackers, allowing them to observe and decrypt the traffic.

That threat can be eliminated through certificate "pinning," which involves hard coding the details for the legitimate digital certificate into an application.

Unlike for Android, Google doesn't do this for iOS, which means an attacker could execute a man-in-the-middle attack and read encrypted communications, Bashan wrote. Google acknowledged the problem after being notified by Lacoon on Feb. 24, but the problem has not been fixed, he wrote.

Google officials did not have an immediate comment.

It isn't clear why certificate pinning isn't used by Google on iOS. But three years ago, a Google security engineer that works on such security issues described a scenario where the handling of digital certificates becomes complicated.

Occasionally, proxy servers used by companies will intercept HTTPS connections using local, ephemeral certificates, wrote Adam Langley on his personal blog. Some security applications and parental control programs will also do this, he wrote.

Those certificates have the authority to override "pins" that have been set to check for a specific certificate, he wrote.

Lacoon described an attack scenario that involved tricking a user into installing an iOS device management configuration file that contains a malicious root digital certificate. That would validate a spoofed certificate, allowing the person to navigate to a fraudulent Gmail site.

"We were quite surprised by this finding because Google had implemented certificate pinning for their Android Gmail app," Bashan wrote. "Clearly, not implementing this for iOS was an oversight by Google."

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags securitymobileGoogleiosapplicationstelecommunicationMobile OSesLacoon Mobile Security

Featured

Slideshows

Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP honoured leading partners across the channel at the Partner Awards 2017 in New Zealand, recognising excellence across the entire print and personal systems portfolio.

Meet the top performing HP partners in NZ
Show Comments