M9 2 articles

M9: Insecure Data Storage (2024)

OWASP Risk Analysis

Sensitive data stored unencrypted in SharedPreferences, UserDefaults, SQLite databases, or app sandbox. Attackers access data on rooted/jailbroken devices or via backups.

Risk Assessment

Threat Agents
Insecure data storage attracts skilled adversaries targeting mobile apps, malicious insiders, state-sponsored actors, cybercriminals, script kiddies, data brokers, competitors, and hacktivists. These actors exploit weak encryption, insufficient data protection, insecure storage mechanisms, and improper credential handling.
Attack Vectors
Exploitability EASY
Attack vectors include unauthorized filesystem access via physical or remote means, weak or absent encryption exploitation, data transmission interception, and malware installation. Rooted or jailbroken devices enable attackers to bypass security and access sensitive data directly.
Security Weakness
Prevalence COMMON Detectability AVERAGE
Weaknesses include weak or nonexistent encryption allowing easy data access, storage in accessible locations like plain text files or unprotected databases, insufficient access controls, and missing secure transmission protocols.
Technical Impact
Impact SEVERE
Data breaches with unauthorized access and extraction of sensitive information. Compromised accounts enabling identity theft. Data tampering causing integrity issues and malicious content injection. Unauthorized resource access to critical files, configurations, and cryptographic keys.
Business Impact
Impact SEVERE
Reputational damage from data breaches causing negative publicity. Loss of customer trust in organizational data protection. Legal consequences including fines, penalties, and lawsuits. Financial implications from breach investigation, customer notification, and settlements.

Am I Vulnerable?

How Do I Prevent It?

Example Attack Scenarios

Based on OWASP Mobile Top 10 (2024) — the industry standard for mobile app security risks.

Platforms

Related Articles