Mass exposure of data in mental health apps vulnerabilities that expose therapy histories

Published 5 min de lectura 124 reading

Millions of people use mobile applications to manage their mental health: mood follow-up, cognitive-behavioral therapy tools, and IA-driven virtual partners that promise support for depression, anxiety or panic attacks. But a recent technical analysis reveals that many of these apps, even with large user bases, leave the most intimate data of their users exposed.

The Oversecred mobile security firm examined ten applications announced as emotional health assistants and documented a total of 1,575 vulnerabilities spread between low, medium and high severity findings. Although none of the identified failures was rated as critical, the number and nature of the problems - from credentials leaks to flat text settings - can facilitate attacks that end up exposing therapy histories, mood records, session notes and other information that many consider extremely sensitive. The details of the study and the media coverage can be found in the public reports of Oversecured and in the note published by BleepingComputer: Oversecred and BleepingComputer.

Mass exposure of data in mental health apps vulnerabilities that expose therapy histories
Image generated with IA.

Among the identified vulnerabilities are classic mobile safety problems that, combined, are dangerous in a clinical context. Some apps process URis provided by the user without correctly validating them, allowing an attacker to force the opening of internal components designed for exclusive use of the application itself. In one case, the unsafe use of Intro.parseUri () with externally controlled chains could allow an attacker to access internal activities that handle tokens or sessions, with the risk of filtering therapy records. Other failures include local storage accessible by any device application, keys or endpoints embedded in APK resources and the use of the java.util.Random class to generate tokens or keys, a cryptographically unsafe practice.

The value of mental health data in the illicit market is real and worrying: According to the researchers cited by Oversecred, therapeutic records are much higher than other stolen data, making users of these apps attractive targets for criminals. This same research warns that most of the applications analyzed lack even basic mechanisms such as the detection of rooted devices, leaving local information entirely at the mercy of any software with high privileges in the terminal.

The specific scanning numbers help to size the range: in the ten revised apps, 54 high severity, 538 average and 983 low problems were detected. Among them are apps with tens of millions of facilities and others with hundreds of thousands; together they were more than 14.7 million downloads according to BleepingComputer's observation. Despite this popularity, only four of the applications had received a recent update at the time of the analysis, raising questions about maintenance and failure response.

For those who use these tools, the situation poses a painful disjunctive: the accessibility and immediate help that many apps offer can be vital, but the promise of "private conversations" or "encrypted chats" is overturned if the technical implementation is weak. Oversecred and the journalists who have covered the case have chosen not to divulge the names of the apps while the coordinated disclosure of vulnerabilities is on course, so users cannot always know with certainty which product is at risk.

What can users do now? First, it is appropriate to check that the applications are updated and to read the privacy policies and the security or transparency section of the developer carefully. If an app handles very sensitive clinical data, a prudent practice is to limit the amount of information stored on the mobile, avoid functions that keep full session transcripts and review the permissions that apply. Keeping the operating system up to date, using biometric or device blocks and not installing unreliable source applications also reduces the attack surface. For those who want to deepen on how to evaluate mobile safety from a technical point of view, community projects such as the OWASP Mobile Top 10 offer good guidelines on threats and mitigation: OWASP Mobile Top 10.

Mass exposure of data in mental health apps vulnerabilities that expose therapy histories
Image generated with IA.

From the perspective of the developer and the companies that offer digital health services, the message is clear: privacy statements are not enough; they must be demonstrated to be implemented through safe practices. This means not including secrets or endpoints in flat text within the binaries, validating any external input - including URis -, using robust cryptographic sources such as SecureRansom, encryption of data at rest and in transit, implementation of the detection of compromised environments and rotation of credentials, and regular audit of units and bookstores. Google Play also forces developers to declare and protect sensitive data in the security section of the app tab; knowing and implementing these policies is part of a serious supplier's duty: Google Play Security Section.

Mental health applications have opened an important door to democratize therapeutic support, but that door must be locked: the information they store and process is among the most sensitive in the digital field. If a service promises confidentiality, that promise must be supported by solid code and architecture, not just by messages in the application store. Meanwhile, journalists, researchers and regulators will continue to monitor and demand transparency so that users can rely without being unnecessarily exposed.

If you want to read the technical report and the original coverage to form your own opinion, you can consult the resources cited by the researchers and the specialized press: the Oversecred site ( oversecured.com) and the BleepingComputer piece that summarizes the findings ( bleepingcomputer.com).

Coverage

Related

More news on the same subject.