Attacks/Breaches

10/23/2017
05:43 PM
50%
50%

Unpatched Bugs Rampant on Mobile Devices in Financial Services Firms

More than a quarter of mobile devices used by financial services employees carry known vulnerabilities, according to a recent report.

Many financial services employees are toting around unpatched mobile devices, putting their companies and customers at risk of a data breach, a recent report found.

More than 25% of mobile devices used by financial services employees had unpatched vulnerabilities, according to Symantec's Q2 2017 Mobile Threat Intelligence Report: Mobility and Finance.

The data, gleaned from Symantec's endpoint mobile security software and other sources, also found that 15% of employees' mobile devices at financial services institutions had been exposed to a malicious network, while three in every thousand devices were infected with malware.

"If I read this report and I was Procter & Gamble, I would be asking my bank, what you are doing to protect my data when your executives are connecting to suspicious WiFi networks, or how many of your employees have phones with malware?" says Varun Kohli, a senior director at Symantec. "I would be asking these questions because my data is at risk."

And although corporate customers may find there is little they can do to protect themselves from the actions - or lack of actions - that their financial services company is taking, Kohli says that may change in the future.

"I hear enterprises are asking their software vendors to take certain steps to protect their information, but I have not heard this of the banks," Kohli says. "But companies need to also ask this of their business partners, too."

Patching Problem

Although Apple and Google may regularly patch vulnerabilities, employees at financial institutions may be unaware of the patch notifications. In part, Apple is able to push its patches out relatively easily since it controls both the hardware and software, whereas the task is more challenging for Android.

When Google issues a patch, it has to be delivered to the device manufacturer, which then performs its own version of the update if it decides to issue a patch for the flaw at all, Kohli says. 

Other findings in the report include a general lack of good mobile security hygiene. For example, more than 13% of mobile devices used by financial services employees lack the latest major OS version, while 99% do not have the latest minor update issued by Google or Apple, the report found.

Some 4.6% of iOS users in this sector have yet to install the latest mobile operating system, compared to 47.8% for Android, according to the report.

Despite those results, the financial services industry as well as the healthcare sector tend to institute more frequent updates than all industries overall, Kohli says. He notes both industries suffer the most attacks because of their valuable information and data and, as a result, more is spent to secure those industries and the devices they use.

"They are early adopters of security; but even then, we are seeing problems," Kohli says. "I was very surprised at the results. I would have expected the number in the financial services industry to be lower."

Related Content:

 

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
8 Ways Hackers Monetize Stolen Data
Steve Zurier, Freelance Writer,  4/17/2018
Securing Social Media: National Safety, Privacy Concerns
Kelly Sheridan, Staff Editor, Dark Reading,  4/19/2018
Firms More Likely to Tempt Security Pros With Big Salaries than Invest in Training
Sara Peters, Senior Editor at Dark Reading,  4/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.