• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security data security Device security Intruders Latest Cybersecurity News

COVID passport apps puts users privacy and their personal data at risk

William Marshal Posted On March 8, 2022
0



COVID passport apps

The Digital Vaccination Applications that are commonly used as safe passes and travel passports are exhibiting behavior that could put users’ privacy at risk. The risks are substantial as these COVID passport apps are used by large population across the world, and are becoming a target beacon for hackers.

COVID passport apps and their security posture

The COVID Passport apps does store a user’s COVID-19 vaccination certificate which includes name, ID number, date of birth, vaccination date, vaccine name and other personally identifiable information (PII) that is encoded in a QR code inside the app. With this QR code the users are accessed for proof of vaccination when they enter certain buildings or travel from one country/city to another.

Though these software is offered by governments and health departments of a nation, they are developed by external developers who could be on a contract to develop the app for public usage.

After some detailed analysis on 40 COVID passport apps and ten validation applications, Symantec team found that 27 of the apps suffer from some of the following privacy and security loopholes.

COVID passport apps’ QR codes aren’t encrypted

The first issue as per Symantec report is that most of these COVID passport apps are generating a QR code that is just encoded and not encrypted. Encode means data conversion, likewise in the vaccination QR code case, the health data is converted to a digital format that would be easy to scan and process.

COVID passport apps
Source: Symantec Report

However, encryption is the process of transforming data into non-readable format using cryptographic algorithms which can be deciphered only using the authorized entities who hold the decryption keys.

Since the QR codes rely on encoding and not encryption, they can be easily decoded and then the sensitive data of the users can be manipulated by any threat actors.

Non-HTTPS health data transfer

The health data transferred from the cloud storage service does not require an HTTPS connection in 38%  of the cases, which makes users data even more vulnerable to man-in-the-middle (MITM) attacks.

External storage permission on Android

The third issue is the data is being stored external with access permission on Android. This is a risky approval as it can give unconditional access and privilege to the device’s locally stored files. This storage issue was identified in 17/40 apps that is 43% in total.  

Adding to the above three security concerns the hard-coded cloud service credentials, absence of SSL CA validation also pushes users data on high risk zone.

COVID passport apps and their poor security
Source: Symantec Report

How can you secure your COVID Passport Apps and its PII data

If you’re entitled to use the Digital Vaccination Passport App, please avoid third-party and external wallets from unknown vendors. Better to stick with the firms that vet them more vigorously, example Google Wallet and Apple Health.

While installing these applications, please ensure you think twice and deny unnecessary permissions without affecting the core functionality of the device.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends


COVIDCOVID19Cybersecuritydata securityPrivacy


Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

You may also like
Top 9 Best Log Management Tools for 2025
September 20, 2025
Top 4 Remote Support Tools for 2025- Best Remote Support Solution
September 18, 2025
Top 5 Best Unified Endpoint Management (UEM) Software for 2025
September 12, 2025
Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search