Mobile and web application security is the new battlefront in the fight against hackers. We’ll help you test and secure your external facing assets to better protect your business online.
Mobile and web applications are crucial to making data available to employees, customers and partners. But these systems that simplifydata availability within the business are attractive targets for cybercriminals.These highly connected applications draw data numerous internal resources and databases. And if hackers can compromise your applications, they can use this foothold to exploit other network resources, or to steal IP and client data.Identifying and addressing vulnerabilities in your web-enabled applications is essential to raising the standard of security within your operations.
Reduce attack potential
Identifying – and resolving – issues with your web applications and mobile apps will strengthen the overall security of your network. Reducing the number of available entry points will make your business much harder to attack.
Identify outdated APIs
Your web applications will use a series of APIs to link disparate services. Outdated APIs can be exploited to gain access to underlying data and credentials. Fidus will analyse the APIs in use, advising where code updates are required to address these vulnerabilities.
Ascertain adherence to OWASP Top 10
Web and Mobile applications will be tested against the OWASP Top 10 methodology to ascertain adherence alongside using Fidus’ own internal methodologies.
Identify insecure services
Third party applications may connect to external data sets to provide additional functionality or context. Each of these services needs to be tested to confirm data is properly secured at every point.
Address unpatched apps, frameworks and mobile operating systems
Third party apps and software also need to be regularly updated to resolve potential exploits. Again, the Fidus mobile and web application testing service will analyse all of your web-enabled assets and mobile apps to identify instances where updates are required.
Environment research
Our security consultants will first inventory all of your applications. They will then research each, to obtain the latest threat intelligence for use in planning our security tests.
Damage modelling
To better understand the severity of the problems identified, our consultants will carry out an extended series of tests. We will (harmlessly!) exploit each vulnerability to assess the degree of risk they present.
Application vulnerability testing
Using a combination of automated tools and our extensive knowledge of cybersecurity, we probe each of your applications for vulnerabilities. We’ll test for common exploits like SQL-injection and cross-site scripting (XSS), as well as more advanced vulnerabilities such as application logic flaws and session management flows.
Plain English reporting
Cybersecurity complicated – but the results of our tests don’t have to be. Our consultants will present the results of our web and mobileapplication tests in easy-to-understand reports. This ensure you can make informed strategic decisions more quickly and easily.
Penetration testing reveals your most sensitive network vulnerabilities – so you need a partner you can trust. Fidus Information Security are an NCSC CHECK Green Light and TIGER scheme approved consultancy. Our cyber security experts hold some of the most recognised certifications in the industry, including CREST Certified Tester and Senior Security Tester. Fidus is also a Cyber Essentials verified company. Every assessment we perform is carried out according to UK industry approved methodologies (OWASP, PETS, NIST) along with our own internal testing frameworks.
Remedial Support
More than just identifying security vulnerabilities, our cyber security experts are on hand to help you fix them too.
Certified Security Consultants
Our CREST and TIGER approved team holds a range of industry-leading security certifications including OSCP, CCT, SST and CISSP
Easy to Understand Reports
We’ll ensure that your executives and technical teams properly understand our assessment findings using plain-English reporting.
Fixed Price Proposals
The price you’re quoted is the price you’ll pay. Our quotes are broken down into a detailed costing table so you know exactly what to expect.
Other approaches we've witnessed have included convoluted steps and commonly ends with incorrect information being handed to the consultant assigned to the engagement.
Our approach to security involves a qualified security consultant through the entire process to ensure quality, accuracy and consistency.
Trusted by
Get in Touch with Fidus Information Security
Exploiting the eRosary Application In this post we’re going to cover a trivial full account takeover vulnerability our team identified within the new eRosary application, whilst placing an order for the watch! The ClickToPray eRosary beads are advertised as ‘an interactive, smart and app-driven device that serves as a tool for learning how to pray […]
In this post, we’re going to detail some of the issues our team identified with the an extremely common Alarm & GPS device used by vulnerable people around the world (at least 10,000+ in the UK). The device in question is manufactured in China and seems to be purchased in bulk by numerous providers who […]
Would you like to speak to us over the phone? Just submit your details and we’ll be in touch shortly. You can also email us if you would prefer – [email protected]
I would like to discuss:
Recently members of the Fidus team noticed an interesting blog post on the OnePlus forum by an individual discussing recent fraudulent attempts made on two of their credit cards. The forum user states that the only place both cards were used was on the OnePlus website in November 2017, they go on to ask whether other members of the community have had the same issue (spoiler:they had). OnePlus are currently using the Magento eCommerce platform, which is a common platform in which credit card hacking takes place.
These findings do not confirm OnePlus have suffered a breach. Instead, they look into the current structure of the payment flow and how it could have been achieved.
A further update has been posted at the bottom of this blog post.
We stepped through the payment process on the OnePlus website to have a look what was going on. Interestingly enough, the payment page which requests the customer’s card details is hosted ON-SITE. This means all payment details entered, albeit briefly, flow through the OnePlus website and can be intercepted by an attacker. Whilst the payment details are sent off to a third-party provider upon form submission, there is a window in which malicious code is able to siphon credit card details before the data is encrypted.
Straight away there are two issues that stand out:
Credit card fraud is not new to the Magento eCommerce platform. Sucuri blogged about this very issue back in 2015.
There are two methods used by attackers to siphon credit cards away from eCommerce stores. The first of which is through the use of Javascript which takes place client-side. This is achieved through malicious JavaScript hosted on the web page which causes the customer’s machine to silently send a crafted request to a server in control of the hacker. This request includes all billing information along with all credit card details. We looked through the page source on the OnePlus checkout and there was no sign of any malicious JavaScript being used. However, it is possible JavaScript code WAS at one-point used to steal data, however, if so, has since been removed. OnePlus has since confirmed this was indeed the method used to steal 40,000 sets of credit card details.
The other method commonly used by attackers, as described in the Sucuri blog, is modification of the app/code/core/Mage/Payment/Model/Method/Cc.php file. This method requires shell access to the server and indicates a serious compromise.
The Cc.php file handles the saving of card details on the eCommerce website. Regardless if card details are actually saved or not, the file is called regardless. Attackers are able to place code within this file which allows for payment details to be compromised and sent to an off-site location controlled by the attacker. Since this takes place within the prepareSave() function within Cc.php, the card details are not yet encrypted and are at risk. An example of malicious code can be seen below:
The below image highlights exactly where an attacker is able to compromise raw credit card data.
As it stands, the poll on the OnePlus forum regarding affected users has over 39 users complaining of recent fraudulent attempt. Numerous users of Reddit have also complained of the same issue.
Users of twitter have also started to question this potential issue.
The safest option to prevent credit card fraud is to use an OFF-SITE payment processor, or a processor who offers iFrame integration with checkout pages. Third-party payment providers have created PCI compliant sandboxes for the very purpose of securely taking card payments; utilise it.
It is worth noting that whilst iFrame integration is a safer option that hosting the payment pages yourselves, it is vulnerable to JavaScript attacks. iFrame integration does however combat malicious code within Magento source code; such as Cc.php.
Furthermore, it is highly recommended to conduct regular penetration testing assessments against your eCommerce websites to highlight any security risks.
Upon further review of the payment system, it should be noted that OnePlus are currently making use of the CyberSource Magento add-on, as can be seen below.
CyberSource note on their Magento marketplace page that all data submission is done within the client’s browser and never touches the eCommerce infrastructure (Fidus do not currently have an environment to test this statement).
If this is true, this leaves 2 potential avenues for attack and rules out the Cc.php theory:
It is also worth noting CyberSource have a statement within their Data Sheet PDF which states:
Secure Acceptance Silent Order POST limits your exposure to payment data, which reduces your PCI DSS scope, because many of the controls may no longer be applicable. For certain businesses, this can mean having to complete the PCI-DSS Self-Assessment Questionnaire (SAQ) versus a full scale audit. No payment solution, however, negates the need to validate compliance. You should consult with your acquiring bank to uate the level compliance required for your organization.
At the point in which the OnePlus eCommerce server responds to the customer with an HTML page containing a payment form, malicious JavaScript could be injected to compromise any inputs which the customer makes; including credit card data.
An update posted on the OnePlus website and an e-mail sent out to affected customers has confirmed a breach did occur and 40,000 customers had their payment details stolen.