Mobile banking apps are holding data insecurely
“Systemic problems” could allow an attacker to manipulate data, take over accounts and commit fraud


Research into a host of mobile banking apps has revealed alarming security fallibilities that could pave the way for cyber criminals to access highly sensitive financial data.
Systemic problems in the financial sector's approach to designing security into mobile banking applications have left glaring holes, spanning from weak encryption standards to data leakage.
Researchers on behalf of Arxan Technologies highlighted 11 types of vulnerability found across 30 Android apps from all flavours of financial institutions across Europe and the US, with a total of 180 critical vulnerabilities discovered.
These, if exploited by an attacker, could lead to identity theft, and account fraud, among other dire consequences.
"When a company fails to implement proper application security technology for its app, it opens up the app to be easily reverse-engineered, potentially leading to account takeovers, data spills, and fraud," said researcher Alissa Valentina Knight.
"As a result, the company could experience significant financial losses and damage to brand, customer loyalty, and shareholder confidence as well as government penalties.
"While the findings in this report are specific to these companies, many of them are systemic across all of the mobile apps tested, and other types of companies should use them as a guide for securing their mobile apps."
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The names of the banking apps in which vulnerabilities were detected have were redacted, presumably for fear that these companies will subsequently be targeted by malicious actors.
Retail banking apps were found to harbour the greatest number of critical vulnerabilities, while US-based health savings account (HSA) companies were the least exploitable. Also, to the researcher's surprise, smaller companies had the most secure development hygiene, while larger companies produced the most vulnerable apps.
The most common vulnerability type was a lack of binary protections, with 97% of apps tested being possible to decompile and review the source code. Moreover, all apps tested failed to implement application security to obfuscate the source code.
Meanwhile, 90% of applications tested engaged in unintended data leakage, with data from the mobile banking app inadvertently made available to other apps on a user's device. This, for instance, could lead an attack to harvest financial data through other apps they have control over on a device.
Additionally, 80% of apps implemented weak encryption algorithms or the incorrect implementation of a strong cipher. Adversaries could, by exploiting this, decrypt sensitive data into its original form and either manipulate or sell this on.
The most worrying finding, however, was that 83% of apps tested stored users' sensitive data insecurely in the first place. Financial data was stored outside of a sandbox and in the device's local file system, external storage, or even copied to the clipboard, according to Knight.
To remedy these issues, she recommended that financial companies adopt a comprehensive approach to security, and employ a number of technologies such as app shielding, encryption and threat analytics.

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
Hackers are targeting Ivanti VPN users again – here’s what you need to know
News Ivanti has re-patched a security flaw in its Connect Secure VPN appliances that's been exploited by a China-linked espionage group since at least the middle of March.
By Emma Woollacott
-
Broadcom issues urgent alert over three VMware zero-days
News The firm says it has information to suggest all three are being exploited in the wild
By Solomon Klappholz
-
Nakivo backup flaw still present on some systems months after firms’ ‘silent patch’, researchers claim
News Over 200 vulnerable Nakivo backup instances have been identified months after the firm silently patched a security flaw.
By Solomon Klappholz
-
Everything you need to know about the Microsoft Power Pages vulnerability
News A severe Microsoft Power Pages vulnerability has been fixed after cyber criminals were found to have been exploiting unpatched systems in the wild.
By Solomon Klappholz
-
Vulnerability management complexity is leaving enterprises at serious risk
News Fragmented data and siloed processes mean remediation is taking too long
By Emma Woollacott
-
A critical Ivanti flaw is being exploited in the wild – here’s what you need to know
News Cyber criminals are actively exploiting a critical RCE flaw affecting Ivanti Connect Secure appliances
By Solomon Klappholz
-
Researchers claim an AMD security flaw could let hackers access encrypted data
News Using only a $10 test rig, researchers were able to pull off the badRAM attack
By Solomon Klappholz
-
A journey to cyber resilience
whitepaper DORA: Ushering in a new era of cyber security
By ITPro