When interacting with Guardsquare customers and prospects, we’re often surprised by the number of companies still in the dark when it comes to visibility into the security of their app after it has been released. During such discussions, I like to refer to the analogy with other monitoring tools, like crash and performance reporting, which are commonly used by all. Using these tools makes total sense because it allows app developers to intervene with hotfixes when observing spikes, such as when there is a significant increase in the number of crashes reported on certain device types or OS versions. Or, mobile development teams could choose to define UX improvements for future release cycles based on observations around usage and performance of the app.
Why not do the same when it comes to your app’s security? That’s where mobile threat monitoring comes in. Mobile threat monitoring allows developers to do the same thing as crash and performance monitoring tools, but from a security point-of-view. This enables app developers to react in real-time against imminent threats and give them the broader insights necessary to enforce their app’s security in future releases.
In 2020, we launched our mobile threat monitoring console ThreatCast. How has the journey been so far? Just like our customers, we have learned a lot. While developing the initial product, we were unsure what to expect regarding the types of threats and the amount of data we’d uncover.
That’s why our initial focus was on the tool’s ease of integration to keep the barriers for adoption low. All it takes for users to get started with ThreatCast is to register the app in the dashboard, include the generated API-key within the DexGuard or iXGuard configuration file, and update the config file as part of the regular build cycle. ThreatCast will start automatically monitoring once the build is deployed.
As you can see, ThreatCast is straightforward to integrate and can immediately provide in-depth visibility into your app’s security after publication. Our customers are using these threat monitoring insights in a variety of ways to improve their mobile app security posture. Here are three different customer stories that showcase the usefulness of mobile threat monitoring.
The security team of a large European bank reached out because they wanted guidance for allowing or disallowing the usage of their apps on rooted and jailbroken devices. While the related escalated privileges don’t have direct implications on their app, the privileged access to things like system files could lead to specific attack scenarios.
The company was a long time Guardsquare customer, but had only used our products for static app protection and hadn’t implemented any runtime protections for their app. So we suggested they start enabling RASP detections in their app in combination with threat monitoring. The initial focus was on quantifying the threat by monitoring only, so the developers enabled RASP checks without crashing the app upon a detected integrity violation.
Since ThreatCast was simple to integrate, the company actively started threat monitoring by the next release of their app. For a couple of release cycles, they were just collecting data and were surprised by the relatively low number of rooted or jailbroken devices connecting. In fact, less than 1% of the app’s active users were using rooted devices. Based on the initial insight, whether to allow or disallow their usage did not seem that essential.
But then the company dug deeper into the data and observed a recurring pattern: There was a strong correlation between the usage of a rooted device and the detection of a binary tamper attack originating from the same device. A significant population of the rooted phone users seemed to be using the escalated privileges of their device to access system files and modify system libraries before executing a direct attack toward the app.
With the next release of their app, the company implemented the user identifier to accompany the threats so the developers could identify malicious actors and take immediate action against them. Additionally, the company started feeding the data into its anti-fraud system with real-time feeds from mobile threat monitoring, enabling them to build more fine-grained fraudulent-user profiles.
Thanks to ThreatCast, the company’s main lesson learned was that they do not necessarily need to make the app crash for every rooted or jailbroken device, but as a precaution, they could limit the usability of the app on rooted or jailbroken devices. The company continues to block users and transactions in real-time thanks to the data from ThreatCast.
A popular app containing premium features got hacked frequently, and it had a direct impact on the company’s revenue. For example, mods unlocking the app’s premium content for free often appeared on obscure stores.
The organization became a Guardsquare customer to implement application hardening and utilize threat monitoring to figure out what was going on after the app was published. Thanks to ThreatCast’s capability to identify the locations of the attacks in their code, the company was able to reinforce the security config of their app with every release. And they continue to do so.
In addition, they learned that attackers are not only targeting the latest version of their app, but also older versions. With this knowledge, the company decided to sunset the older versions, only allowing its users to use the three latest releases. Since DexGuard and iXGuard use a polymorphic approach, every release will be obfuscated differently. That means every new app release resets the clock for attackers, forcing them to restart their reversing engineering efforts from scratch. As a result, sunsetting older releases on a regular basis has been a very effective measure. The company also decided to shorten its release cycles based on insights from ThreatCast, such as how long it takes attackers to perform specific attacks against their app.
A large financial institution was already using ThreatCast for a while, but the company’s support team was getting occasional complaints from end-users about the app crashing. The support team was totally in the dark about the exact reason for the crashes, so all they could do was to take a note of the complaint and forward it to the mobile engineering teams to investigate what went wrong.
This not only led to unhappy customers, but was also frustrating for the developers who already had a hard time meeting release schedules and were confronted with these types of hiccups.
Since the usage of a threat monitoring tool like ThreatCast is very straightforward, the customer decided to open up the dashboard to its support team. Doing so allowed the support team to simply enter the internal customer ID in the search field to see all related security incidents of that user at a glance. This enabled the customer service representatives to reply to customer complaints on the spot. The ThreatCast data explained not only why the crash occurred, but also how it was observed. Opening up ThreatCast to another department within the organization led to faster response rates for end-users and resulted in reduced stress levels for the mobile engineering team.
Here are three key takeaways from mobile threat learnings based on visibility gained from ThreatCast: