PaymentsJournal
No Result
View All Result
SIGN UP
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
PaymentsJournal
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
No Result
View All Result
PaymentsJournal
No Result
View All Result

Unbelievable! Top Mobile Payment Apps Are Dangerously Insecure

By Tim Sloane
November 30, 2015
in Analysts Coverage
0
0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn

This article on Infoworld.com identifies that Bluebox Security’s 2015 Payment App Security Study found insufficient security in two P2P apps and three one-click store specific mobile apps:

“U.S. retailers are ramping up for the holiday shopping season, but shoppers should think twice before paying with mobile payment apps such as Apple Pay and Venmo, a study warned. Bluebox Security’s 2015 Payment App Security Study found that security was lacking in at least 10 popular mobile payment apps for Android and iOS.

Bluebox Security decided not to reveal the names of offending apps to protect individual shoppers using them from attack. Instead, the report focused on the types of flaws found.

Consumers may not realize “they are opting for the convenience of on-the-go payments over the security imparted by traditional methods like cash or checks, ultimately putting their dollars at risk,” said Andrew Blaich, lead security analyst at Bluebox Security.

In every app reviewed, security was “remarkably basic.” The apps in the study lacked enterprise-grade protections to safeguard financial transactions. For example, none of the apps had antitampering controls to prevent payments from being manipulated. None of the apps encrypted data written to disk, meaning authentication data, transaction history, and other personal information was readily available to attackers with access to the device.

Bluebox Labs selected and tested five payment apps available for both Android and iOS. Two were peer-to-peer payment apps used to send monetary gifts to friends and family, and three were one-click merchant apps from leading retailers. The apps were selected based on searches for top mobile payment apps and app store rankings. Bluebox also ran the apps on both jailbroken and nonjailbroken devices to understand how that affected overall security.”

The testing found a range of security failures:

“Every app was vulnerable to tampering that would allow funds to be routed from the user’s account to one controlled by the attacker. Any attacker with minor skill and access to the app from an app store can modify the app, including adding malware/spyware into the original code, and none of the payment apps examined in the study had any code integrity checks. This is troubling, considering that P2P payment apps are not FDIC insured; if the money gets lost, there is no consumer protection.
Bluebox Security found one good security practice: One of the apps used certificate pinning to protect data in transit to its cloud servers. Certificate pinning helps mitigate man-in-the-middle attacks. However, since the app did not have antitampering controls, attackers would be able to disable certificate pinning.

Only two Android apps obfuscated code. None of the iOS apps did. Obfuscation “should be a standard practice across all payment apps,” Bluebox Security said. Three Android apps and three iOS apps had debug and admin messages still turned on, which is another basic developer mistake.”

The full white paper from Bluebox can be found here. Of course we trust that Apple Pay, Android Pay and Samsung Pay have implemented far more robust security, but it is disheartening to learn that major corporations have published mobile payment applications that fail to incorporate basic security.

Overview by Tim Sloane, VP, Payments Innovation at Mercator Advisory Group

Read the full story here

0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn

    Get the Latest News and Insights Delivered Daily

    Subscribe to the PaymentsJournal Newsletter for exclusive insight and data from Javelin Strategy & Research analysts and industry professionals.

    Must Reads

    payment fraud

    From Reaction to Prevention: Rethinking Payment Fraud

    March 5, 2026
    first-party-fraud

    Returns, Disputes, and the Rise of First-Party Fraud

    March 4, 2026
    commercial payments

    From Theory to Application: The Impending Transformation of Commercial Payments

    March 3, 2026
    Payments Modernization, ACH payments

    ACH and the Path Toward Future-Ready Payments

    March 2, 2026
    millennial gen z business owner

    Gen Z and Millennials Are Business Owners: Are Banks Ready?

    February 27, 2026
    google blockchain

    Why Banks Should Follow Fintechs’ Lead on Developer Portals

    February 26, 2026
    credit unions

    Not Just Another Bank: How Credit Unions Can Reach Younger Members

    February 25, 2026
    fraud

    Escalating Scams Demand a Dedicated Response

    February 24, 2026

    Linkedin-in X-twitter
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter

    ©2026 PaymentsJournal.com |  Terms of Use | Privacy Policy

    • Commercial Payments
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    No Result
    View All Result