Millions of people use mobile applications to manage their mental health: mood follow-up, cognitive-behavioral therapy tools, and IA-driven virtual partners that promise support for depression, anxiety or panic attacks. But a recent technical analysis reveals that many of these apps, even with large user bases, leave the most intimate data of their users exposed.
The Oversecred mobile security firm examined ten applications announced as emotional health assistants and documented a total of 1,575 vulnerabilities spread between low, medium and high severity findings. Although none of the identified failures was rated as critical, the number and nature of the problems - from credentials leaks to flat text settings - can facilitate attacks that end up exposing therapy histories, mood records, session notes and other information that many consider extremely sensitive. The details of the study and the media coverage can be found in the public reports of Oversecured and in the note published by BleepingComputer: Oversecred and BleepingComputer.

Among the identified vulnerabilities are classic mobile safety problems that, combined, are dangerous in a clinical context. Some apps process URis provided by the user without correctly validating them, allowing an attacker to force the opening of internal components designed for exclusive use of the application itself. In one case, the unsafe use of Intro.parseUri () with externally controlled chains could allow an attacker to access internal activities that handle tokens or sessions, with the risk of filtering therapy records. Other failures include local storage accessible by any device application, keys or endpoints embedded in APK resources and the use of the java.util.Random class to generate tokens or keys, a cryptographically unsafe practice.
The value of mental health data in the illicit market is real and worrying: According to the researchers cited by Oversecred, therapeutic records are much higher than other stolen data, making users of these apps attractive targets for criminals. This same research warns that most of the applications analyzed lack even basic mechanisms such as the detection of rooted devices, leaving local information entirely at the mercy of any software with high privileges in the terminal.
The specific scanning numbers help to size the range: in the ten revised apps, 54 high severity, 538 average and 983 low problems were detected. Among them are apps with tens of millions of facilities and others with hundreds of thousands; together they were more than 14.7 million downloads according to BleepingComputer's observation. Despite this popularity, only four of the applications had received a recent update at the time of the analysis, raising questions about maintenance and failure response.
For those who use these tools, the situation poses a painful disjunctive: the accessibility and immediate help that many apps offer can be vital, but the promise of "private conversations" or "encrypted chats" is overturned if the technical implementation is weak. Oversecred and the journalists who have covered the case have chosen not to divulge the names of the apps while the coordinated disclosure of vulnerabilities is on course, so users cannot always know with certainty which product is at risk.
What can users do now? First, it is appropriate to check that the applications are updated and to read the privacy policies and the security or transparency section of the developer carefully. If an app handles very sensitive clinical data, a prudent practice is to limit the amount of information stored on the mobile, avoid functions that keep full session transcripts and review the permissions that apply. Keeping the operating system up to date, using biometric or device blocks and not installing unreliable source applications also reduces the attack surface. For those who want to deepen on how to evaluate mobile safety from a technical point of view, community projects such as the OWASP Mobile Top 10 offer good guidelines on threats and mitigation: OWASP Mobile Top 10.

From the perspective of the developer and the companies that offer digital health services, the message is clear: privacy statements are not enough; they must be demonstrated to be implemented through safe practices. This means not including secrets or endpoints in flat text within the binaries, validating any external input - including URis -, using robust cryptographic sources such as SecureRansom, encryption of data at rest and in transit, implementation of the detection of compromised environments and rotation of credentials, and regular audit of units and bookstores. Google Play also forces developers to declare and protect sensitive data in the security section of the app tab; knowing and implementing these policies is part of a serious supplier's duty: Google Play Security Section.
Mental health applications have opened an important door to democratize therapeutic support, but that door must be locked: the information they store and process is among the most sensitive in the digital field. If a service promises confidentiality, that promise must be supported by solid code and architecture, not just by messages in the application store. Meanwhile, journalists, researchers and regulators will continue to monitor and demand transparency so that users can rely without being unnecessarily exposed.
If you want to read the technical report and the original coverage to form your own opinion, you can consult the resources cited by the researchers and the specialized press: the Oversecred site ( oversecured.com) and the BleepingComputer piece that summarizes the findings ( bleepingcomputer.com).
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...