By topics
App Store/Play store review tampering
Attackers use fake reviews or ratings to manipulate user trust and encourage downloads of malicious apps.
Application logic vulnerabilities
Application logic vulnerabilities occur when design and coding decisions allow the normal logic of the application to be manipulated by attackers.
Attacks targeting wearables and smart devices
Cybercriminals exploit vulnerabilities in wearable tech and IoT devices to access sensitive data or disrupt operations.
Biometric authentication attacks
Biometric authentication attacks exploit or bypass biometric systems like fingerprint, iris, or facial recognition.
Broken authentication
Broken authentication occurs when attackers can compromise the identity of users, often through weak or flawed authentication mechanisms.
Business email compromise attacks
Business Email Compromise (BEC) attacks involve attackers sending fraudulent emails that impersonate trusted entities, such as executives, vendors, or colleagues, to deceive users into transferring funds, sharing sensitive information, or performing unauthorized actions.
Cloud jacking attacks
Cloud jacking refers to attacks where attackers gain unauthorized access to cloud accounts, allowing them to control or manipulate cloud resources.
Cloud-based attacks
Cloud-based attacks exploit misconfigurations or vulnerabilities in the cloud storage or services used by mobile apps.
Cross-site scripting (XSS)
Cross-site scripting (XSS) is a type of injection attack where malicious scripts are injected into web pages or apps.
Cryptocurrency scams
Cryptocurrency scams exploit the growing interest in digital currencies by creating fraudulent investment apps or schemes.
Data breaches in cloud providers
Data breaches in cloud providers occur when attackers exploit vulnerabilities in cloud infrastructures or services to gain unauthorized access to sensitive data.
Deepfake videos used to discredit people or organizations
Deepfake videos employ AI technologies to produce highly realistic but entirely fake visual representations of individuals, often making them appear to say or do things they never did.
Deepfakes
Deepfakes leverage artificial intelligence to create realistic but fraudulent representations of individuals.
Denial-of-service (DoS) attacks
Denial-of-service (DoS) attacks overwhelm cloud servers with traffic, making the app unavailable to legitimate users.
DNS spoofing attacks
DNS spoofing, also known as DNS cache poisoning, occurs when attackers manipulate the DNS (Domain Name System) resolution process, redirecting users to malicious websites that appear legitimate.
Eavesdropping on unsecured Bluetooth connections
Bluetooth eavesdropping occurs when attackers exploit weak or absent encryption in Bluetooth communication.
Eavesdropping on unsecured networks
Eavesdropping on unsecured networks occurs when attackers intercept communications between a mobile device and a server, particularly over unencrypted or poorly secured connections such as public Wi-Fi.
Exploit kits targeting mobile devices
Exploit kits are pre-packaged sets of malicious tools designed to identify and exploit device vulnerabilities.
Fake login pages/mobile apps
Attackers create counterfeit login pages or apps to steal user credentials.
Improper access control
Improper access control occurs when an application fails to enforce permissions correctly, allowing users to access data or perform actions that should be restricted.
Increased automation in attacks
Attackers leverage AI and automation tools such as botnets or automated phishing to scale and execute attacks more efficiently, often overwhelming traditional defenses.
Injection flaws
Injection flaws occur when untrusted data is sent to an interpreter as part of a command or query.
Insecure APIs
Insecure APIs (Application Programming Interfaces) occur when mobile apps communicate with cloud services or other external systems using poorly secured APIs.
Insecure app installation
Insecure app installation occurs when users download and install mobile applications from untrusted sources, such as unofficial app stores or third-party websites.
Insecure communication channels
Insecure communication channels refer to situations where sensitive data is transmitted between a mobile app and backend servers over unsecured or poorly secured networks.
Insecure data storage on device
Insecure data storage occurs when mobile applications store sensitive information such as user credentials, personal data, or financial information without adequate encryption or protection.
Insecure deserialization
Insecure deserialization occurs when untrusted data is used to reconstruct objects or data structures (deserialization), without sufficient validation or protection.
Insecure direct object references (IDOR)
Insecure direct object references (IDOR) occur when an application provides direct access to objects based on user-supplied input, without properly validating whether the user is authorized to access that resource.
Insecure in-app advertising
Malicious ads within apps steal data, redirect users to phishing sites, or use advanced tactics like AI-driven targeting to deceive users.
Insecure mobile payment systems
Insecure mobile payment systems can expose sensitive data, such as credit card details, transaction history, or personal information.
Insecure server-side code execution
Insecure server-side code execution refers to vulnerabilities in the backend code running on cloud servers that can be exploited by attackers to execute arbitrary code or gain unauthorized access.
Insecure Wi-Fi networks
Insecure Wi-Fi networks, particularly open or public networks, do not use encryption to secure data transmitted over the connection.
Insider threats
Insider threats come from malicious actors within an organization who have authorized access to cloud resources.
Insufficient identity and access management (IAM)
Insufficient identity and access management (IAM) occurs when cloud resources, including those used by mobile applications are not properly secured with strong access control policies.
Insufficient logging and monitoring
Insufficient logging and monitoring is a critical security vulnerability that arises when applications or backend systems fail to capture and monitor key events effectively.
Internet of things (IoT) integration attacks
These attacks exploit vulnerabilities and insecure channels or APIs in IoT devices that interact with mobile apps.
Lack of encryption for data at rest and in transit
Encryption is critical for protecting data both at rest (stored data) and in transit (data being transferred over networks).
Location tracking attacks
This attack involves using apps or malware to collect precise location data from users without their knowledge.
Malicious app permissions
Malicious app permissions occur when mobile applications request more permissions than necessary to function, potentially granting attackers access to sensitive data or critical device functionality.
Man-in-the-middle (MitM) attacks
Man-in-the-middle (MitM) attacks occur when an attacker intercepts and potentially alters communication between a mobile device and a server without either party being aware.
Man-in-the-middle (MitM) attacks via malicious public Wi-Fi
MitM attacks occur when an attacker positions themselves between a user and the internet, intercepting or altering data sent over unsecured or misconfigured connections.
Misconfigured cloud storage buckets
Misconfigured cloud storage buckets refer to storage instances, such as Amazon S3 or Google Cloud Storage, that are incorrectly set up to allow public access or insufficient access controls.
Mobile app backdoors
Mobile app backdoors are hidden functionalities in apps that provide attackers with persistent, unauthorized access.
Mobile malware
Mobile malware refers to malicious software specifically designed to target mobile devices.
Mobile malware downloaded from third-party app stores
This attack occurs when malicious apps are disguised as legitimate ones and downloaded from untrusted sources.
Mobile ransomware
Mobile ransomware infects devices through malicious apps, email attachments, or links.
Outdated OS and applications
Running outdated operating systems (OS) or applications leaves devices vulnerable to known exploits, increasing the risk of malware infections, data breaches, and remote attacks.
Physical loss or device theft
The physical loss or theft of a mobile device poses a significant security risk, especially if the device is not adequately secured.
Pretexting attacks
Attackers use fabricated stories to manipulate users into revealing sensitive information or taking unauthorized actions.
Prompt injection attacks
A prompt injection attack (PIA) happens when attackers hide malicious instructions inside normal-looking user input.
QR code phishing attacks
Attackers use malicious QR codes to redirect users to phishing sites or install malware.
Rooting and jailbreaking
Rooting (Android) and jailbreaking (iOS) refer to the process of removing manufacturer-imposed restrictions on a mobile device, granting users full control over the operating system.
Security misconfiguration
Security misconfiguration refers to improperly configured security settings in an application, server, or cloud environment.
Session hijacking
Session hijacking occurs when attackers steal or manipulate a user's session ID or authentication token, allowing them to take over the user's session without needing their credentials.
Shared responsibility model issues
The shared responsibility model in cloud computing defines the division of security responsibilities between cloud providers and customers.
SMS/text-based phishing attacks
SMS-based phishing (or "smishing") attacks exploit the trust users place in their mobile devices.
Social engineering attacks
Social engineering attacks, such as phishing, rely on psychological manipulation to trick users into revealing sensitive information or performing unsafe actions.
Social engineering on messaging apps
This attacks tricks users into sharing information or clicking malicious links on messaging platforms.
Social media phishing attacks
Social media phishing attacks use fake social media messages or posts to deceive users into exposing sensitive information or clicking malicious links.
Socially engineered SIM swapping
SIM swapping relies on social engineering tactics to trick telecom providers into porting a victim's number to an attacker-controlled SIM card.
Subscription Traps
Subscription traps are a form of fraud where users unknowingly enroll in recurring payments through misleading offers or hidden terms.
Supply chain attacks
Supply chain attacks target vulnerabilities in software development tools, third-party libraries used in mobile apps, or other components in the software supply chain, such as build pipelines or update mechanisms.
Supply chain attacks targeting app development tools
This attack compromises tools used by developers to inject vulnerabilities into multiple apps.
Tailgating/shoulder surfing attacks
These attacks involve observing users as they enter sensitive information (such as passwords or PINs) on mobile devices, or gaining physical access to secure areas where mobile devices are used, often during login or payment processes.
Unpatched network devices
Unpatched network devices, such as routers, firewalls, and switches, can be targeted by attackers when these devices contain known vulnerabilities that haven’t been addressed with security patches or firmware updates.
Unvalidated inputs
Unvalidated inputs occur when an application fails to properly validate or sanitize the data entered by users.
Use of hardcoded credentials
Hardcoding credentials, such as usernames, passwords, API keys, or cryptographic keys, directly into the source code of a mobile app is a major security risk.
Vishing attacks
Voice phishing or ‘vishing’ involves fraudulent phone calls to deceive users into revealing sensitive information.
Watering hole attacks
Watering hole attacks target specific groups by compromising websites or mobile apps that their intended victims frequently visit.
Weak encryption protocols
Weak encryption protocols refer to outdated or vulnerable encryption methods that no longer provide adequate protection for data in transit or at rest.
Weak screen lock
Weak screen lock refers to the use of easily guessable or insecure screen lock mechanisms.
Zero-click attacks
Zero-click attacks target flaws in mobile apps or operating systems that allow attackers to gain control without any user action, such as opening a link or downloading a file.
Zero-day vulnerabilities
A zero-day vulnerability refers to a security flaw in software that is unknown to the vendor and for which no patch or mitigation is available at the time of exploitation.
