Symantec researchers recently discovered a concerning trend in popular mobile apps for both Android and iPhone devices. These apps, some with millions of downloads, were found to expose hardcoded and unencrypted credentials to cloud services within their code bases. This revelation opens up the possibility for anyone with access to the app’s binary or source code to extract these credentials and potentially exploit cloud infrastructure for malicious purposes.
The exposed credentials include those for Amazon Web Services (AWS) and Microsoft Azure Blog Storage, and can be found in apps available on Google Play and Apple’s App Store. This means that sensitive information, such as AWS production credentials, access keys, secret keys, and more, were readily accessible within the code of these apps. Additionally, staging credentials were also found in some cases, further highlighting the security risks associated with these vulnerabilities.
Symantec engineers emphasized the severity of this issue, emphasizing that the widespread nature of these vulnerabilities across both iOS and Android platforms calls for an immediate shift towards more secure development practices for mobile applications. The potential for data manipulation, exfiltration, and severe security breaches resulting from the exposure of these credentials underscores the urgent need for developers to prioritize security in their app development processes.
In their research, Symantec pinpointed several widely distributed mobile applications that contained hardcoded AWS or Azure credentials. For example, the Pic Stitch: Collage Maker app on Google Play was found to include production AWS credentials, while three iOS apps, including Crumbl, were found to expose AWS credentials as well. These credentials, stored in plaintext within the apps’ codebases, posed a significant security risk, potentially allowing attackers to intercept communications and gain unauthorized access to cloud resources.
Furthermore, the inclusion of WebSocket Secure (WSS) endpoints and unencrypted credentials in these apps further highlighted the need for more secure development practices and proper encryption mechanisms. The exposure of these critical cloud resources to potential attacks could have far-reaching implications for the integrity and security of the applications and their backend infrastructure.
Moving to Android apps, Symantec identified three applications that exposed credentials to Microsoft Azure Blob Storage. Apps like Meru Cabs and Sulekha Business were found to embed hardcoded Azure credentials within their codebases, putting critical cloud storage resources at risk of abuse. The vulnerabilities found in these apps underscore the importance of secure development practices and the need for robust encryption and protection of sensitive information.
To mitigate these risks, Symantec emphasized the importance of following best practices for managing sensitive information in app development. Using environment variables to store credentials at runtime, leveraging dedicated secrets management tools like AWS Secrets Manager or Azure Key Vault, and integrating automated security-scanning tools into the development pipeline were among the recommended strategies to enhance security and protect against common security flaws.
Overall, the exposure of hardcoded and unencrypted credentials in popular mobile apps serves as a wake-up call for the industry to prioritize security in app development processes. With the increasing reliance on cloud services and the growing threat landscape, developers must adopt secure practices to safeguard sensitive information and protect against potential security breaches and data misuse.

