Security company Promon released a statement yesterday warning about the use of the Home Office’s “Brexit” app for mobile devices. While the company did not clarify how the application is vulnerable, Promon stated that the app was tested against “basic and commonly used attack methods and tools, which often require very limited technical skills to use.” Promon is warning that it is currently possible to steal sensitive information provided by users of the application like passport details, photo IDs. Because the app is responsible for handling this type of information, Promon is also warning of the following scenarios:
- Attackers could easily modify and repackage the app to target users
- The app does not defend against code injection
- The app will run regardless of phones being rooted or jailbroken
- It is possible to debug the app
- Spyware can easily log anything being typed into the app’s text fields
- The app was released without obfuscation, making it easy for an attacker to gain an understanding of the code
- Several of the attacks are possible regardless of whether or not the user has a rooted or jailbroken device