Skip to main content

1,500 iOS apps are vulnerable to a security threat: Here’s how you can stay safe

Best Phablets Apple iPhone 6 Plus
Image used with permission by copyright holder
Apple’s operating systems are typically considered exceptionally safe and secure, but even Apple’s OS X and iOS aren’t  invulnerable to attacks from hackers and serious bugs. Recently, security firm SourceDNA revealed that an HTTPS-crippling flaw can be exploited in around 1,500 iOS apps. Hackers who discover the vulnerability can gain access to sensitive information such as credit card numbers and encrypted passwords through the affected apps.

We found that the vast majority of apps in the top 100 free apps on the App Store are safe.

Recommended Videos

We searched through the most commonly downloaded apps in the App Store, and found that very few of the most popular free and paid apps are still affected by the bug. Regardless, it’s best to check if your apps are vulnerable and to learn how to protect yourself.

Here’s everything you need to know.

Please enable Javascript to view this content

Here’s how hackers exploit the flaw

According to the security firm, around two million people have installed apps that suffer from the HTTPS-crippling vulnerability. The apps include Citrix OpenVoice Audio Conferencing, Alibaba’s mobile app, Movies by Flixster with Rotten Tomatoes, KYBankAgent 3.0, and Revo Restaurant Point of Sale, among others. The researchers are trying to keep the full list of apps under wraps so as to avoid opening iOS users up to more hackers who would use the vulnerability for nefarious purposes. However, on its website, SourceDNA offers a tool to developers so they can check if their apps are safe.

The researchers found that the vulnerability comes from a problem in an older version of an open-source code library called AFNetworking, which allows developers to add networking capabilities to their apps. AFNetworking fixed the issue about three weeks ago, and many developers have already updated their iOS apps to close the hole, but at least 1,500 iOS apps are still vulnerable. Among the companies that have already fixed the flaw are Yahoo, Uber, and Microsoft.

SourceDNA explained in a blog post that any app that’s still using the older version of the AFNetworking code is vulnerable to man-in-the-middle attacks that allow hackers to decrypt HTTPS-encrypted data. Here’s how it works: Hackers who want to exploit the flaw simply hop onto a coffee shop Wi-Fi network to monitor the targeted device. The hackers then send the device a fraudulent secure sockets layer certificate. Typically, the device would realize that the certificate is a fake, and the device would drop the connection immediately. However, devices with apps that run the older version of the AFNetworking code have a logic error that allows the fake certificate to pass without a security check.

The reason why the check is never carried out by these apps is that the AFNetwork version 2.5.1 doesn’t offer certificate pinning, which ensures that apps use a specific certificate for HTTPS authentication and encryption. The absence of this extra security check leaves the affected apps completely open to hackers. Now that SourceDNA has publicly revealed the vulnerability, app developers will most likely move to fix the flaw, but it could take time.

Here’s how to protect yourself

App updates iOS Based on the report, it seems that hackers have to target your device using public Wi-Fi networks like the ones found in cafes and stores. Any untrusted Wi-Fi network should be avoided for the time being. You can also turn off background app refresh on your iPhone or iPad, so the apps don’t try to connect to open networks.

If you’re concerned that your iPhone or iPad might house affected apps, you can check your apps using SourceDNA’s tool. You should also update all of your apps in case affected developers have already issued an update to patch the hole. You can update your apps by going to the App Store app and going to the updates tab in the bottom right-hand corner.

We used SourceDNA’s tool to search for a handful of popular apps on the App Store to see which ones are affected by the bug. We found that the vast majority of apps in the top 100 free apps on the App Store are safe. We also checked a handful of top paid apps and found very few affected.

Here’s a full list of the commonly-used apps:

  • Google – No vulnerable apps
  • Yahoo – Yahoo Finance version 2.3.2
  • Microsoft – OneDrive version 5.1
  • Facebook – No vulnerable apps
  • Snapchat – No vulnerable apps
  • Instagram – No vulnerable apps
  • Pandora – No vulnerable apps
  • Netflix – No vulnerable apps
  • WhatsApp – No vulnerable apps
  • Pinterest – No vulnerable apps
  • Twitter – No vulnerable apps
  • Spotify – No vulnerable apps
  • Skype – No vulnerable apps
  • Amazon – No vulnerable apps
  • Uber – Uber version 2.64
  • The Weather Channel – No vulnerable apps
  • Vine – No vulnerable apps
  • SoundCloud – SoundCloud version 3.8.1
  • eBay – No vulnerable apps
  • Waze – No vulnerable apps
  • Beats Music – No vulnerable apps
  • Viber – No vulnerable apps
  • Shazam – No vulnerable apps
  • Yelp – No vulnerable apps
  • Fitbit – No vulnerable apps
  • Tinder – No vulnerable apps
  • Dropbox – No vulnerable apps
  • Tumblr – No vulnerable apps
  • Slack – No vulnerable apps
  • Afterlight – No vulnerable apps
  • Minecraft – No vulnerable apps
  • Ustwo – No vulnerable apps
  • Dark Sky – No vulnerable apps

As you can see, the number of affected apps that are popular is actually very small, and that number continues to shrink as companies perform updating. While 1,500 apps sounds like a huge number, given the millions of apps in the App Store, the reality is much smaller than you might think. Nonetheless, it’s better safe than sorry, so check out your apps here.

Malarie Gokey
Former Digital Trends Contributor
As DT's Mobile Editor, Malarie runs the Mobile and Wearables sections, which cover smartphones, tablets, smartwatches, and…
Kino is the iPhone camera app I’d recommend to everyone
Recording a video in Kino camera app.

The Halide camera app is one of the hot favorites among folks who take mobile photo and video capture seriously. A fair share of content creators that I know have completely replaced the iPhone’s stock camera app with Halide, all thanks to the deep creative controls that it offers.

The app recently added a fantastic feature called Process Zero, which switches all the AI processing and delivers pristine shots. However, for all the deep controls that Halide has to offer, it also serves up a sharp learning curve. At times, it can even get overwhelming.

Read more
How to use iOS 18 FaceTime gestures (and what they look like)
Video reactions in macOS Sonoma, with the balloons effect in use.

Apple iOS 17 brought FaceTime gestures to the iPhone last year, livening up the FaceTime experience for all users. FaceTime gestures are even more useful now with iOS 18 and Apple Intelligence. Once it’s set up correctly, you’ll be able to send 3D animations to your friends and family during FaceTime video calls. You’ll even be able to trigger the animations with physical gestures.

Getting your phone ready for action doesn’t take much time or effort, but we put this guide together to walk you through the process nonetheless. 
How to make a FaceTime gesture in iOS 18

Read more
I hate the new Photos app in iOS 18
Photos app on iOS 18.

When Apple launched the iPhone 16 line, it also released iOS 18 to the masses after months of betas. Though the biggest feature of iOS 18 is Apple Intelligence, which didn’t actually launch until the iOS 18.1 release, there are plenty of other things that iOS 18 brings to the table. That includes RCS messaging, more home screen customization, a revamped Control Center, and more.

One app that got a significant redesign in iOS 18 is the Photos app. After around a decade of mostly the same design and what I would call muscle memory, the new Photos app is, well, quite jarring — and I'm not a fan.
The new Photos app is messy
The old Photos app Christine Romero-Chan / Digital Trends

Read more