Menu
Android and iOS apps still being cloned to spread malware

Android and iOS apps still being cloned to spread malware

Finance, healthcare and retail are top targets

Mobile app cloning from unauthorised app sites now affects 97 percent of the top 100 paid Android apps and 87 percent of the Apple iOS apps in the same category, with financial services, healthcare and retail popular targets for criminals, Arxan Technology's annual survey of the phenomenon has found.

For the top 20 free apps on the two platforms, the percentages are almost as bad at 80 percent and 75 percent respectively.

Incredibly, for Android at least, this is a slight improvement over last year when the top 100 paid app-cloning percentage was 100 percent although Apple's has deteriorated markedly from the 56 percent found then.

The main sources of these apps are the dark side of third-party sites and Torrent downloads so this is an issue that would only affect foolhardy Android users and Apple users with jailbroken devices.

Unexpectedly, among these apps are many financial, healthcare and retail apps one might assume users would only download for free from the official app stores or the providers themselves.

Looking at the top 40 in each category, Arxan found that the cloning of financial apps has reached 96 percent on Android and 70 percent on iOS, both increases compared to 2013. For retail, the figures was 90 percent for Android and 35 percent for iOS while for healthcare it was 90 percent for Android (the Apple percentage was not quoted).

For the average user who sticks to the official app store, none of this will be of much concern which suggests that it is the app developers themselves who have most to lose from an app cloning industry that is essentially borrowing their brands to spread malware.

"It's evident from our research and various reports from leading industry experts that mobile applications are vulnerable to reverse-engineering, repackaging, republishing and susceptible to becoming malicious weapons," said Arxan.

"To combat these threats, organisations must adopt pre-emptive and reactive measures," it said, including runtime protection and code confidentiality.

More serious, of course, is the possibility of direct assault - the Masque and Wirelurker attacks have hit the assumed invulnerability of iOS platform hard in recent weeks.


Follow Us

Join the newsletter!

Or
Error: Please check your email address.

Tags securityApple

Featured

Slideshows

Bumper channel crowd kicks off first After Hours of 2018

Bumper channel crowd kicks off first After Hours of 2018

After Hours made a welcome return to the channel social calendar with a bumper crowd of partners, distributors and vendors descending on The Jefferson in Auckland to kick-start 2018. Photos by Gino Demeer.

Bumper channel crowd kicks off first After Hours of 2018
Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Show Comments