Redtail isn't the only firm with cybersecurity issues

Redtail isn't the only firm with cybersecurity issues
Study of 30 mobile apps found vulnerabilities at 29 firms.
MAY 28, 2019

Redtail Technology is the latest firm dealing with the fallout of a cybersecurity issue, but it likely won't be the last. In an email sent to advisers last week, Redtail blamed its leak on systems that inadvertently stored investors' personal information on a debug log file. These files record database operations, system processes, and errors for software developers in case they need to fix something. Redtail's debug file was publicly accessible to anyone with an internet connection. But Redtail is hardly alone, said Alissa Knight, a senior analyst with Aite Group's cybersecurity practice. In a recent study of the security of 30 mobile apps from financial services firms in the U.S. and Europe, information stored inappropriately on a debug file that could be accessed publicly was identified as a common issue. "Many of the apps I looked at were also mistakenly configured to log in debug mode, logging everything happening within the app, including sensitive data to log files," Ms.Knight said. (More:State regulators release model cybersecurity rule) While she wouldn't disclose the name of the firms she studied, they spanned banking, retail brokerage, financial technology vendors and auto insurance, she said. Ms. Knight concluded that there is "a systemic problem" across both financial services firms and fintech: "a widespread absence of application security controls and secure coding." Despite the amount of sensitive data these firms handle, many are still failing to apply adequate security to apps, she said. Ms. Knight found vulnerabilities in 29 of the 30 apps analyzed. It took her less than nine minutes to identify the issue at many of them. Especially concerning is the application programming interfaces (APIs) that companies use to integrate data with third-parties, she said. Financial services companies and fintech vendors have a habit of hard-writing credentials and API keys into the code. Anyone who knows where to look can gain access. And hackers know where to look. "Hackers are beginning to shift their focus to attacking organizations and end users via their mobile apps by finding vulnerabilities in the code due to a lack of code obfuscation being employed to secure apps," Ms. Knight wrote in her report. The increase in the number of API codes that can be seen publicly on the internet is one reason hackers are increasingly focusing there, she said. Also, it's relatively easy to learn the company's API URLs by looking at the company's mobile app source code. If security experts know this can be a problem, why is it happening? One reason might be companies outsourcing app development offshore to save costs. (More: Fintech goes international to find top tech talent) "I was talking to some of the fintech companies and asked this very thing," she said. "They tell me a lot of the time companies they outsource to will publish the code and the fintech or financial services companies aren't even involved in the process."

Latest News

Trump not planning to fire Powell, market tension eases
Trump not planning to fire Powell, market tension eases

Futures indicate stocks will build on Tuesday's rally.

From stocks and economy to their own finances, consumers are getting gloomier
From stocks and economy to their own finances, consumers are getting gloomier

Cost of living still tops concerns about negative impacts on personal finances

Women share investing strengths, asset preferences in new study
Women share investing strengths, asset preferences in new study

Financial advisors remain vital allies even as DIY investing grows

Trump vows to 'be nice' to China, slash tariffs
Trump vows to 'be nice' to China, slash tariffs

A trade deal would mean significant cut in tariffs but 'it wont be zero'.

Fed's Kugler warns of worse-than-expected impact of tariffs
Fed's Kugler warns of worse-than-expected impact of tariffs

Inflation, economic risk is greater than previously thought.

SPONSORED Compliance in real time: Technology's expanding role in RIA oversight

RIAs face rising regulatory pressure in 2025. Forward-looking firms are responding with embedded technology, not more paperwork.

SPONSORED Advisory firms confront crossroads amid historic wealth transfer

As inheritances are set to reshape client portfolios and next-gen heirs demand digital-first experiences, firms are retooling their wealth tech stacks and succession models in real time.