Mobile banking apps reportedly leaked thousands of digital fingerprints

Cloud Security
(Image credit: laymanzoom / Shutterstock)

Five unnamed mobile banking apps using the same third-party AI-based digital identity SDK may have leaked over 300,000 biometric digital fingerprints, according to a report by researchers at Symantec.

Outsourcing the digital identity and authentication component of an app is a common development pattern according to researchers, as the complexities of providing different forms of authentication can be challenging for app developers.

But the approach failed dramatically in this instance, embedded in the banking apps SDK were Amazon Web Services (AWS) cloud credentials that could allegedly expose the private authentication data and keys belonging to "every banking and financial app" using the SDK. 

What is the full extent of vulnerability?

In addition, using the vulnerable SDK researchers were able to find the users' biometric digital fingerprints that were used for authentication in the cloud, alongside personal data such as names and dates of birth.

What’s more, if Synametic’s claims are to be believed researchers were also apparently able to unearth the API source code and AI models used for the entire underlying operation.

But the issue goes deeper than five banking apps.

The researchers said over 1,859 publicly available apps, including both Android and iOS, had AWS credentials contained within them.

Although Android devs aren’t entirely blameless, the research found over 97% of these vulnerable apps were iOS-based.

Out of these apps, over three-quarters (77%) of them contained valid AWS access tokens allowing access to private AWS cloud services and 47% contained valid AWS tokens that also gave full access to numerous, often millions, of private files via the Amazon Simple Storage Service (Amazon S3).

How can I prevent this?

The researchers did provide some tips about how to mitigate these types of vulnerabilities. 

These included adding security scanning solutions to the app development lifecycle and, if using an outsourced provider, requiring and reviewing mobile app "report cards", which they said can identify any unwanted app behaviors or vulnerabilities for every release of a mobile app.

As an app developer, the researchers suggested looking for a report card that both scans SDKs and frameworks in your application and identifies the source of any vulnerabilities or unwanted behaviors.

Will McCurdy has been writing about technology for over five years. He has a wide range of specialities including cybersecurity, fintech, cryptocurrencies, blockchain, cloud computing, payments, artificial intelligence, retail technology, and venture capital investment. He has previously written for AltFi, FStech, Retail Systems, and National Technology News and is an experienced podcast and webinar host, as well as an avid long-form feature writer.

Read more
Someone holding a passport with two boarding passes inside it
Top digital loan firm security slip-up puts data of 36 million users at risk
A close-up photo of an iPhone, with the App Store icon prominent in the center of the image.
App stores are increasingly becoming a major security worry
mobile phone
Popular Android financial help app is actually dangerous malware
Malware worm
Coordinated global mobile malware campaign targets banking apps and cryptocurrency platforms
Dark Web cybercriminals are buying up ID to bypass KYC methods
Android phone malware
Screen reading malware found in iOS app stores for first time - and it might steal your cryptocurrency
Latest in Security
A graphic showing fleet tracking locations over a city.
Lost & Found tracking site hit by major data breach - over 800,000 could be affected
US President Donald Trump speaks to the press as he signs an executive order to create a US sovereign wealth fund, in the Oval Office of the White House on February 3, 2025, in Washington, DC.
US set to pause cyber-offensive operations against Russia - but CISA says it won't stop
Web DDoS attacks see major surge as AI allows more powerful attacks
Polish space agency says it was hit by a cyberattack
Illustration of a hooked email hovering over a mobile phone
AWS misconfigurations reportedly used to launch phishing attacks
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
Microsoft Teams and other Windows tools hijacked to hack corporate networks
Latest in News
Google Gemini iPhone Lock Screen
You can now access Gemini from your iPhone's lock screen
Michelle, Keats, and Doctor Amherst looking unimpressed and worried in The Electric State
Netflix drops trailer for The Electric State, and I'm getting serious District 9 vibes
YouTube TV
YouTube TV might be planning a big Netflix update that puts the best streaming services first
Google Pixel 9 Pro
Here are the 7 best Pixel 9 and Pixel Watch 3 features landing in March’s Pixel Feature Drop
Bang & Olufsen Beogram 4000C Saint Laurent Rive Droite Edition
Bang & Olufsen's latest reworked turntable is a masterpiece of retro revival, in a breathtaking wooden presentation box
Apple Watch Series 10
Apple unveils new Apple Watch bands – here's what's in the Spring 2025 collection