Insights
This blog has been taken from Malcore’s analysis results. The points below are not an exhaustive list. For a full view of Malcore’s static analysis of the Paypal App APK view it on Malcore.
Try Malcore for Free!
First 5 scans are free on registration
Discovered Trackers
Qualtrics
Google AdMob
Google Firebase Analytics
Google Tag Manager
Adjust
Amplitude
Google CrashLytics
GIPHY Analytics
High severity warnings from code analysis
The app uses jackson deserialization library. Deserialization of untrusted input can result in arbitrary code execution
Insecure Implementation of SSL. Trusting all the certificates or accepting self signed certificates is a critical Security Hole. This application is vulnerable to MITM attacks.
This App has capabilities to prevent against Screenshots from Recent Task History/ Now On Tap etc.
App can read/write to External Storage. Any App can read data written to External Storage.
The App uses an insecure Random Number Generator.
Files may contain hardcoded sensitive information like usernames, passwords, keys etc.
App uses SQLite Database and execute raw SQL query. Untrusted user input in raw SQL queries can cause SQL Injection. Also sensitive information should be encrypted and written to the database.
App creates temp file. Sensitive information should never be written into a temp file.
This App download files using Android Download Manager.
The App uses an insecure Random Number Generator.
Suspicious severity warnings from code analysis
Application attempts to discover build version of device
Dangerous Labelled permissions from Android
Android Dangerous labelled permissions as Dangerous from this library https://developer.android.com/reference/android/Manifest.permission.
N/A
To view how these results compare within industry see our analysis:
To view how these scores are created visit our transparency post where we published a description of our phone application threat scoring algorithm.