The mobile app security headaches continue. This time it's spyware found by mobile security firm Zimperium that not only steals data, but can silently control mic and camera — and secretly delete security apps. Fun times. Credit: Thinkstock / Oliur Rahman More mobile app security headaches have popped up, including a new one discovered by mobile security firm Zimperium that not only steals data, but can silently control mic and camera as well as secretly delete security apps. IT has, for the most part, gotten fairly decent at controlling apps on corporate-owned devices, but safeguards about apps being added after they are issued to employees is weaker than it should be. When it comes to BYOD devices, which are owned by employees and contractors, IT and security admins need to get far more strict. Most mandate a variety of (more or less) secure enterprise apps for functionality, as well as critical security apps for protection. That’s where things get sticky. How far can — and should — the IT and security folks go in protecting corporate data, networks and devices? On the one hand, the device is owned by the employee/contractor and they seemingly have the right to download whatever app they want. But does that right have a limit when it threatens the security of the enterprise? Is partitioning enterprise systems enough? (You already know the answer: No, of course it’s not enough.) Once a malware app gains control of the device, it typically can access everything or almost everything. Let’s look at the latest threat. “Unlike other spyware campaigns that typically take advantage of on-device vulnerabilities, this campaign, known as PhoneSpy, hides in plain sight on victims’ devices, masquerading as legitimate Android lifestyle apps, from TV streaming to yoga instruction. In reality, however, the spyware is stealthily exfoliating data from the victim’s device, including login credentials, messages, precise granular location and images. PhoneSpy is also capable of uninstalling any apps, including mobile security apps,” noted an excellent report in TechCrunch. “Researchers at mobile security firm Zimperium, which discovered PhoneSpy inside 23 apps, say the spyware can also access a victims’ camera to take pictures and record video in real time, and warned that this could be used for personal and corporate blackmail and espionage. It does this without a victim knowing, and Zimperium notes that unless someone is watching their web traffic, it would be difficult to detect.” There are a lot of good and frightening thoughts in that quote. Let’s start with “unless someone is watching their web traffic.” That is an excellent practice, and yet few IT operations do that even with their corporate-issued phones, let alone BYOD devices. The worst part of PhoneSpy is its ability to surreptitiously delete security apps, which effectively obliterates most enterprise mobile security programs. Of course, the real question is why Google has such weak security screening for its apps. (And, yes, Apple’s system is just as bad.) But not all apps come via Google Play and PhoneSpy is one of them. It is pushed through social media and other environments, and the user needs to agree to download it. These kinds of security woes are one reason Apple has so publicly taken a stance against “side-loading” apps outside its own App Store. That doesn’t mean app stores are 100% malware free, but it’s the wild west outside those marts. That’s the reality enterprise IT — and certainly enterprise CISOs — must deal with. One solution would be to require that IT at least approve any app not on a widely-disseminated corporate allow list. But that doesn’t mean admins should voice any judgments on personal apps, be it a game, a health program, or something more saucy. The focus needs to remain on what’s dangerous. And as PhoneSpy shows, there’s a lot of danger out there. Related content opinion A phish by any other name should still not be clicked By Evan Schuman Apr 05, 2024 6 mins Technology Industry Communications Security Industry opinion McDonald's serves up a master class in how not to explain a system outage When McDonald's in March suffered a global outage preventing it from accepting payments, it issued a lengthy statement about the incident that was vague, misleading and yet still allowed many of the technical details to be figured out. By Evan Schuman Apr 01, 2024 7 mins Mobile Payment Data Center Industry opinion Why are CIOs who anticipate the future rarely allowed to do anything about it? Wall Street’s obsession with quarterly earnings has made it extraordinarily difficult for most enterprises to spend on long-term investments, or even mid-term investments. By Evan Schuman Mar 08, 2024 5 mins IT Director IT Strategy IT Leadership opinion The food delivery driver identification dilemma Ever use one of those mobile food delivery apps — only to realize your delivery person isn't who you expected? There's a lesson here about identity, authentication, and what happens when the best laid tech plan meets human beings. By Evan Schuman Mar 01, 2024 6 mins Small and Medium Business Mobile Apps Mobile Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe