Upwardly Mobile - API & App Security News

Is Direct-to-Consumer the Future of Mobile Apps Distribution?


Listen Later

Podcast Episode Title: "Upwardly Mobile: The Shift to Direct-to-Consumer (DTC) Distribution
  • Mobile applications and their APIs are vital for accessing data and services, but they are also major targets for security breaches.
  • Bad actors exploit vulnerabilities to steal data, disrupt services, and hijack devices.
  • The mobile app security landscape is challenging because app code is easily available and can be reverse-engineered.
  • A key challenge is determining if an app or its environment has been tampered with.
  • Client software attestation is important for verifying the authenticity of a mobile client before granting server access.
The Shift to Direct-to-Consumer (DTC) Distribution
  • Mobile app developers are exploring direct-to-consumer (DTC) distribution methods due to the limitations imposed by traditional app stores.
  • DTC offers advantages such as increased revenue, enhanced user relationships, and greater flexibility and control.
  • Legislation such as the EU's Digital Markets Act (DMA) is promoting open app ecosystems.
  • Alternative app stores like the Epic Games Store, Amazon Appstore and Samsung Galaxy Store are gaining traction.

The Mobile Threat Model:
  • There are five key attack surfaces in the mobile ecosystem:
    • User Credentials
    • App Integrity
    • Device Integrity
    • API Channel Integrity
    • API and Service Vulnerabilities
  • Attackers often explore these surfaces to extract information to set up automated attacks on APIs.
  • User credentials can be stolen through phishing, spoofing, and data breaches.
  • Attackers may also target the app itself to extract information or transform it into a tool for attacks.
  • Device integrity can be compromised via rooting or jailbreaking, allowing attackers to bypass security mechanisms.
  • API channels are vulnerable to man-in-the-middle (MitM) attacks, even when using HTTPS.
  • APIs can be attacked through credential stuffing, data theft, and denial-of-service (DoS) attacks.
Approov's Solution:
  • Approov provides a client software attestation solution that validates the identity and genuineness of the mobile client.
  • Approov-enabled servers can determine the integrity of software applications running on client devices.
  • The client software creates a special code (cryptographic hash) to prove it hasn’t been tampered with.
  • This code is sent to an attestation service, which checks its validity.
  • Approov's checks include code signing, detection of jailbroken/rooted devices, and checks on the device's OS and key files.
  • A device is denied access to the server if it fails to meet these standards.
  • Approov can be integrated into the Software Development Lifecycle (SDLC).
  • Approov provides enhanced security, helps ensure regulatory compliance, and offers a cost-effective solution.
  • Approov's patented technology strengthens server-client interactions by validating client software.
  • It ensures app originality, detects compromised devices, and verifies device integrity.
How Approov Works (Detailed):
  • Mobile App Registration: The Approov CLI tool is used to register new apps by analyzing them and creating a unique signature.
  • App Makes API Calls: When a protected API call is made, the Approov SDK initiates an integrity assessment if no token is available.
  • Integrity Assessment: The SDK and the Approov cloud service perform checks on the app's runtime environment and authenticity, and if the security policy is met, a short-lived cryptographically signed Approov token is provided.
  • Approov Token Delivery: The token is added to the API request header.
  • Approov Token Check: The backend API checks the validity of the token before granting access.
  • If the token check fails, the request is likely from a compromised app, environment, or a script and would typically be blocked.
  • Approov also provides Runtime Secrets Protection, securing API keys and transmitting them only to valid, untampered app instances.
Benefits of Approov:
  • Protects against automated attacks on APIs.
  • Prevents the exploitation of stolen user credentials.
  • Protects against known and zero-day vulnerabilities.
  • Guards against malicious manipulation of API business logic.
  • Helps to stop Man-in-the-Middle attacks.
  • Improves trust and revenue in the mobile app ecosystem.
  • Provides extra security for Mobile Device Management (MDM), Mobile Payment Systems, Enterprise Applications and IoT/OT devices.
Penetration Testing with Approov:
  • Approov blocks access to the API from tampered apps, compromised environments and scripting tools, which can interfere with pentesting.
  • To test APIs protected by Approov, pentesters can:
    • Force the device to always pass the Approov check.
    • Disable Approov's certificate pinning.
    • Use Approov example tokens.
Key Considerations for Mobile App Security:
  • Shift left, but shield right: Address security early in the development process and put controls in place to protect the running service.
  • Understand the attack surfaces and how they can be exploited.
  • Prioritize threat modeling based on the value of assets exposed and the capabilities of bad actors.
  • Balance the effort to find vulnerabilities with ensuring countermeasures are in place and working effectively.
Conclusion:
  • Mobile app security is crucial for protecting sensitive data and ensuring the integrity of mobile services.
  • Adopting solutions like Approov can significantly strengthen an app's security posture and protect against various threats.
  • Embracing an open app ecosystem and exploring DTC distribution can also empower developers and promote innovation.
These notes should provide a solid overview of the key topics related to mobile app security, referencing the information in the provided documents.

lsDgp0fzUGR7b2cuqPcd
...more
View all episodesView all episodes
Download on the App Store

Upwardly Mobile - API & App Security NewsBy Approov Limited