{"id":48286,"date":"2022-09-02T15:16:40","date_gmt":"2022-09-02T15:16:40","guid":{"rendered":"https:\/\/www.darkreading.com\/cloud\/aws-tokens-android-ios-apps-corporate-cloud-data"},"modified":"2022-09-02T15:16:40","modified_gmt":"2022-09-02T15:16:40","slug":"aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\/","title":{"rendered":"AWS Tokens Lurking in Android, iOS Apps Crack Open Corporate Cloud Data"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt8e4ab22d3a043901\/62e2e4972b85cb6d849ce65f\/Cloud-Kalawin-adobe.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Thousands of customer-facing Android and iOS mobile apps \u2014 including banking apps \u2014 have been found to contain hardcoded Amazon Web Services (AWS) credentials that would allow cyberattackers to steal sensitive information from corporate clouds.<\/p>\n<p>Symantec researchers uncovered 1,859 business apps that use hardcoded AWS credentials, specifically access tokens. Of these, three-quarters (77%) contain valid AWS access tokens for logging into private AWS cloud services; and close to half (47%) contain valid AWS access tokens that also crack open millions of private files housed in <a href=\"https:\/\/www.darkreading.com\/application-security\/cloud-misconfig-exposes-3tb-sensitive-airport-data-amazon-s3-bucket\" target=\"_blank\" rel=\"noopener\">Amazon Simple Storage Service (Amazon S3) buckets<\/a>.<\/p>\n<p>That means that a malicious-minded user of the app could easily extract the tokens and be off to the data-theft races, tapping into the cloud resources of the businesses that created the applications.<\/p>\n<h2 class=\"regular-text\">Thanks, Mobile Software Supply Chain<\/h2>\n<p>This unfortunate state of affairs is thanks to a mobile code supply chain issue, Symantec researchers said \u2014 vulnerable components that allow developers to embed hardcoded access tokens.<\/p>\n<p>&#8220;We discovered that over half (53%) of the apps were using the same AWS access tokens found in other apps,&#8221; they said in an&nbsp;<a href=\"https:\/\/symantec-enterprise-blogs.security.com\/blogs\/threat-intelligence\/mobile-supply-chain-aws\" target=\"_blank\" rel=\"noopener\">analysis&nbsp;on Sept. 1<\/a>. &#8220;Interestingly, these apps were often from different app developers and companies. [Eventually] the AWS access tokens could be traced to a shared library, third-party SDK, or other shared component used in developing the apps.&#8221;<\/p>\n<p>The firm found that these shared, hardcoded AWS tokens are used by in-house app developers for a variety of reasons, including downloading or uploading large media files, recordings, or images from the company cloud; accessing configuration files for the app; collecting and storing user-device information; or accessing individual cloud services that require authentication, such as translation services. However, the tokens&#8217; reach into the cloud is often far greater than the developer may realize.<\/p>\n<p>&#8220;The problem is, often the same AWS access token exposes all files and buckets in the Amazon S3 cloud, often corporate files, infrastructure files and components, database backups, etc.,&#8221; according to the analysis. &#8220;Not to mention cloud services beyond Amazon S3 that are accessible using the same AWS access token.&#8221;<\/p>\n<p>As an example, one of the apps uncovered by the analysis was created by a B2B company that offers an intranet and communication platform. It also provides a mobile software-development kit (SDK) for customers to use to access the platform.<\/p>\n<p>&#8220;Unfortunately, the SDK also contained the B2B company&#8217;s cloud infrastructure keys, exposing all of its customers&#8217; private data on the B2B company&#8217;s platform,&#8221; Symantec researchers noted, adding that they notified all organizations using vulnerable apps of the issue. &#8220;Their customers&#8217; corporate data, financial records, and employees&#8217; private data was exposed. All the files the company used on its intranet for over 15,000 medium-to-large-sized companies were also exposed.&#8221;<\/p>\n<p>The same situation held true for a collection of mobile banking apps on iOS that rely on the AI Digital Identity SDK for authentication. The SDK embeds AWS tokens that could be used to access private authentication data and keys belonging to every banking and financial app using it, as well as 300,000 banking users&#8217; biometric digital fingerprints used for authentication, and other personal data (names, dates of birth, and more).<\/p>\n<p>&#8220;Apps with hardcoded AWS access tokens are vulnerable, active, and present a serious risk,&#8221; Symantec researchers concluded. &#8220;[And] this is not an uncommon occurrence.&#8221;<\/p>\n<h2 class=\"regular-text\"><strong>Avoiding Cloud Compromise via Mobile Apps<\/strong><\/h2>\n<p>Organizations can take steps to ensure that the apps they build for their customers don&#8217;t unwittingly offer a path to cyberespionage, according to Scott Gerlach, co-founder and CSO at StackHawk.<\/p>\n<p>&#8220;Adding DevSecOps tools, like secret scanning, to <a href=\"https:\/\/www.darkreading.com\/application-security\/software-development-pipelines-cybercriminals-free-range-access-cloud-on-prem\">continuous integration\/continuous development pipelines (CI\/CD)<\/a> can help ferret out these types of secrets when building software,&#8221; he noted in a statement. &#8220;And it&#8217;s critical that you understand how to manage and securely provision AWS and other API keys\/tokens to prevent unwarranted access.&#8221;<\/p>\n<p>From a design perspective, developers can also replace hardcoded credentials with API calls to a repository or software as-a-service (SaaS) vault, or to use temporary tokens, according to Tony Goulding, cybersecurity evangelist at Delinea.<\/p>\n<p>&#8220;[That way] they can pull a credential or key down in real-time that doesn&#8217;t persist on the device, in the app, or a local config file,&#8221; he said in a statement. &#8220;An alternative approach is to use the AWS STS service to provision temporary tokens to grant access to AWS resources. They&#8217;re similar to their long-term brethren except they have a short lifespan that&#8217;s configurable \u2014 as little as 15 minutes. Once they expire, AWS won&#8217;t recognize them as valid, preventing an illicit API request using that token.&#8221;<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/cloud\/aws-tokens-android-ios-apps-corporate-cloud-data\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Thousands of corporate mobile apps developed by businesses for use by their customers contain hardcoded AWS tokens that can be easily extracted and used to access the full run of corporate data stored in cloud buckets.Read More <a href=\"https:\/\/www.darkreading.com\/cloud\/aws-tokens-android-ios-apps-corporate-cloud-data\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-48286","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AWS Tokens Lurking in Android, iOS Apps Crack Open Corporate Cloud Data 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AWS Tokens Lurking in Android, iOS Apps Crack Open Corporate Cloud Data 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-02T15:16:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt8e4ab22d3a043901\/62e2e4972b85cb6d849ce65f\/Cloud-Kalawin-adobe.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"AWS Tokens Lurking in Android, iOS Apps Crack Open Corporate Cloud Data\",\"datePublished\":\"2022-09-02T15:16:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\\\/\"},\"wordCount\":771,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt8e4ab22d3a043901\\\/62e2e4972b85cb6d849ce65f\\\/Cloud-Kalawin-adobe.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\\\/\",\"name\":\"AWS Tokens Lurking in Android, iOS Apps Crack Open Corporate Cloud Data 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt8e4ab22d3a043901\\\/62e2e4972b85cb6d849ce65f\\\/Cloud-Kalawin-adobe.jpg\",\"datePublished\":\"2022-09-02T15:16:40+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt8e4ab22d3a043901\\\/62e2e4972b85cb6d849ce65f\\\/Cloud-Kalawin-adobe.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt8e4ab22d3a043901\\\/62e2e4972b85cb6d849ce65f\\\/Cloud-Kalawin-adobe.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AWS Tokens Lurking in Android, iOS Apps Crack Open Corporate Cloud Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AWS Tokens Lurking in Android, iOS Apps Crack Open Corporate Cloud Data 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\/","og_locale":"en_US","og_type":"article","og_title":"AWS Tokens Lurking in Android, iOS Apps Crack Open Corporate Cloud Data 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-09-02T15:16:40+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt8e4ab22d3a043901\/62e2e4972b85cb6d849ce65f\/Cloud-Kalawin-adobe.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"AWS Tokens Lurking in Android, iOS Apps Crack Open Corporate Cloud Data","datePublished":"2022-09-02T15:16:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\/"},"wordCount":771,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt8e4ab22d3a043901\/62e2e4972b85cb6d849ce65f\/Cloud-Kalawin-adobe.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\/","url":"https:\/\/www.threatshub.org\/blog\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\/","name":"AWS Tokens Lurking in Android, iOS Apps Crack Open Corporate Cloud Data 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt8e4ab22d3a043901\/62e2e4972b85cb6d849ce65f\/Cloud-Kalawin-adobe.jpg","datePublished":"2022-09-02T15:16:40+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt8e4ab22d3a043901\/62e2e4972b85cb6d849ce65f\/Cloud-Kalawin-adobe.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt8e4ab22d3a043901\/62e2e4972b85cb6d849ce65f\/Cloud-Kalawin-adobe.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/aws-tokens-lurking-in-android-ios-apps-crack-open-corporate-cloud-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"AWS Tokens Lurking in Android, iOS Apps Crack Open Corporate Cloud Data"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48286"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48286\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}