The diagnosis is in: Mobile health apps are bad for your privacy

Sensitive data is moving through Android healthcare apps without adequate protection. Researchers found that many transmit information without encryption, store files without safeguards, or share it through third-party components.

mobile healthcare apps privacy

Study design showing data collection, static security analysis (MobSF, RiskInDroid, OWASP), and sentiment-based review analysis

How the study worked

The methodology followed three phases: data collection, security and privacy testing, and user experience analysis.

To gather the sample, the team used twenty targeted search terms on Google Play, including healthcare, medical, fitness tracker, and telemedicine. They took the top thirty results for each term and collected metadata such as app IDs, install ranges, and developer names. They ended up testing 272 apps.

The security and privacy phase used three static analysis frameworks for cross-validation. MobSF disassembled each application’s code and looked for unsafe network settings, weak cryptography, exposed activities or services, and poorly configured manifest files. Findings were mapped to CWE identifiers for comparison with known vulnerability classes.

RiskInDroid analyzed 150 of the apps to map declared permissions against actual API calls, identifying undeclared but used permissions that could act as hidden data channels. It also flagged proprietary permissions by comparing entries to the Android Manifest namespace and checking them against MobSF’s API traces.

OWASP Mobile Audit tested 95 apps using static application security testing rules. It searched for issues such as unencrypted local storage, hardcoded credentials, and missing input validation. Each weakness was classified under the OWASP Mobile Top 10 categories to align results with industry standards.

Findings From MobSF

MobSF assigned each app a score based on security weaknesses in permissions, network handling, certificate management, and manifest configuration. Scores ranged from 35 to 60 out of 100, with an average of 47, suggesting widespread weaknesses rather than isolated flaws.

High-risk permissions were frequent. POST_NOTIFICATIONS appeared in 221 apps, CAMERA in 176, WRITE_EXTERNAL_STORAGE in 204, READ_EXTERNAL_STORAGE in 188, and ACCESS_FINE_LOCATION in 146. MobSF also found 529 proprietary or undocumented permissions, usually from third-party SDKs that could access downloads, read device identifiers, or write directly to storage without user awareness.

Network analysis uncovered 22 apps configured to trust all TLS certificates, 42 that allowed unencrypted HTTP traffic, and two that disabled certificate pinning. Cryptographic inspection showed 134 apps vulnerable to the Janus exploit, 58 using SHA1-RSA, and 9 using MD5. Each of these creates openings for interception or tampering with sensitive data.

Results From RiskInDroid and OWASP Mobile Audit

RiskInDroid confirmed that every analyzed app used at least one undeclared permission. Many could send SMS messages, access location data, or alter system settings without explicit consent. More than 100 used account management permissions that could expose user credentials. These permissions often originated from embedded advertising or analytics components.

OWASP Mobile Audit found an average of 44 critical vulnerabilities per app and over 2,000 high-severity issues. Common problems included insecure storage, unvalidated inputs, and weak credential handling. One app contained 299 critical issues, while another exceeded 11,000 high-severity findings. The data suggests that most apps reached users without consistent security testing.

Broader patterns

Users often complained about login failures, password reset errors, and frozen screens. These usability problems tended to occur in the same apps with the weakest security scores, suggesting that poor engineering practices affected both stability and protection.

Across all tools, three trends stood out. First, many developers integrated tracking and advertising libraries that collect more data than necessary. Second, outdated cryptographic algorithms remain common because stores do not enforce minimum standards. Third, default network configurations often remain unchanged, leaving insecure connections active.

The researchers described these as systemic problems caused by fast app deployment, reused code, and limited review during development.

The authors suggest several measures to improve security. App stores could integrate automated scanners such as MobSF and RiskInDroid into submission systems, rejecting apps that fail baseline tests. Developers should use strong encryption, validate certificates, and remove redundant permissions.

Permissions should always match an app’s stated purpose. Undeclared or proprietary ones should trigger review or removal. They also recommend expanding oversight to include wellness apps that collect medical data but fall outside medical regulations.

Source link

Visited 3 times, 3 visit(s) today

Related Article

Mobile Commerce Statistics 2025 (Market Size & Key Trends)

In 2025, over 1.65 billion people are expected to shop through their phones, accounting for nearly one-third of the global digital population. The global mobile commerce market itself is already worth trillions and is projected to grow at double-digit rates over the next decade. Over the past few years, mobile commerce or m-commerce has become

Word and Excel apps for iPhone and iPad not working for many

It seems something has gone terribly wrong with Microsoft’s Word and Excel apps for iOS and iPadOS. Complaints started pouring in yesterday, with users reporting everything from complete freezes to apps that crash within seconds of opening a document. One user on Reddit’s Excel community mentioned they had to screenshot their grocery list because the

Nvidia unveils first Blackwell chip wafer made with TSMC in US

(Reuters) – Nvidia (NVDA.O) uveiled on Friday the first U.S.-made Blackwell wafer, produced at TSMC’s (2330.TW) semiconductor manufacturing facility in Phoenix, as demand for AI chips accelerates. Companies have been racing to meet the broader AI industry’s voracious appetite for computing power as they develop AI technology that meets or exceeds human intelligence. The move

Google Play Teases Android XR Apps And Games

Google has stealthily rolled out a curated collection of apps and games in the Play Store, previously referenced as being built for Android VR or simply Daydream. The page gives us our best browsing experience so far of what you’ll be able to play when compatible headsets come. The initial lineup includes games, live content

20 Minutes Till Dawn, Afterplace, Sword of Elpisia, more

Reg. $1+/FREE+ Your Friday afternoon edition of the best Android game and app deals are now ready to roll down below. Some highlights include 20 Minutes Till Dawn, Afterplace, Sword of Elpisia, Liege Dragon, and more, just be sure to also scope out the big-time $400 price drop we are tracking on the most affordable

Think About Buying a Burner Phone When You Get Your Holiday Tickets This Year

Border agents in the US are dramatically stepping up searches of people coming into the country, even US citizens returning from trips. And they have the authority to search your personal devices. With your phone adding another layer to concerns about crossing the border, you have more to consider when traveling than ever. This isn’t just hyperbole.