Breaking

COVID passport apps puts users privacy and their personal data at risk

The Digital Vaccination Applications that are commonly used as safe passes and travel passports are exhibiting behavior that could put users’ privacy at risk. The risks are substantial as these COVID passport apps are used by large population across the world, and are becoming a target beacon for hackers.

COVID passport apps and their security posture

The COVID Passport apps does store a user’s COVID-19 vaccination certificate which includes name, ID number, date of birth, vaccination date, vaccine name and other personally identifiable information (PII) that is encoded in a QR code inside the app. With this QR code the users are accessed for proof of vaccination when they enter certain buildings or travel from one country/city to another.

Though these software is offered by governments and health departments of a nation, they are developed by external developers who could be on a contract to develop the app for public usage.

After some detailed analysis on 40 COVID passport apps and ten validation applications, Symantec team found that 27 of the apps suffer from some of the following privacy and security loopholes.

COVID passport apps’ QR codes aren’t encrypted

The first issue as per Symantec report is that most of these COVID passport apps are generating a QR code that is just encoded and not encrypted. Encode means data conversion, likewise in the vaccination QR code case, the health data is converted to a digital format that would be easy to scan and process.

Source: Symantec Report

However, encryption is the process of transforming data into non-readable format using cryptographic algorithms which can be deciphered only using the authorized entities who hold the decryption keys.

Since the QR codes rely on encoding and not encryption, they can be easily decoded and then the sensitive data of the users can be manipulated by any threat actors.

Non-HTTPS health data transfer

The health data transferred from the cloud storage service does not require an HTTPS connection in 38%  of the cases, which makes users data even more vulnerable to man-in-the-middle (MITM) attacks.

External storage permission on Android

The third issue is the data is being stored external with access permission on Android. This is a risky approval as it can give unconditional access and privilege to the device’s locally stored files. This storage issue was identified in 17/40 apps that is 43% in total.  

Adding to the above three security concerns the hard-coded cloud service credentials, absence of SSL CA validation also pushes users data on high risk zone.

Source: Symantec Report

How can you secure your COVID Passport Apps and its PII data

If you’re entitled to use the Digital Vaccination Passport App, please avoid third-party and external wallets from unknown vendors. Better to stick with the firms that vet them more vigorously, example Google Wallet and Apple Health.

While installing these applications, please ensure you think twice and deny unnecessary permissions without affecting the core functionality of the device.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Top 9 Best Log Management Tools for 2025

Discover the best log management tools for efficient system management and monitoring. Learn about the…

6 months ago

Top 4 Remote Support Tools for 2025- Best Remote Support Solution

Taking remote of devices and managing them will make thing simple for IT admins. In…

6 months ago

Top 5 Best Unified Endpoint Management (UEM) Software for 2025

In 2024, the Unified Endpoint Management Software market will continue to evolve and here are…

6 months ago

Top 5 Threat Intelligence Tools For 2025

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

7 months ago

Top 5 Best Microsoft Intune Alternatives to Consider for 2025

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

8 months ago

Recast Software: Advanced Endpoint Management and Security Tools for IT Teams

Recast Software offers a suite of tools designed to enhance and simplify endpoint management in…

1 year ago