Apple iOS apps are worse at leaking sensitive data than Android apps, worrying research finds - here's what you need to know
Half of iOS apps and one-third of Android apps expose sensitive information

- Report warns attackers can intercept API calls on iOS devices, and make them appear legitimate
- Traditional security tools fail to protect apps against in-device attacks
- Compromised mobile devices significantly increase the risk of API exploitation
New research from Zimperium has claimed mobile apps are now the primary battleground for API-based attacks, creating serious risks of fraud and data theft for enterprises.
The research shows 1 in 3 Android apps and more than half of iOS apps leak sensitive data, offering attackers direct access to business-critical systems.
Even more worrying the report claims three of every 1,000 mobile devices arealready infected, with 1 in 5 Android devices encountering malware in the wild.
The scale of mobile API vulnerabilities
Unlike web applications, mobile apps ship API endpoints and calling logic onto untrusted devices, exposing them to potential tampering and reverse-engineering.
This allows attackers to intercept traffic, modify the app, and make malicious API calls appear legitimate.
Traditional defenses such as firewalls, gateways, proxies, and API key validation cannot fully protect against these in-app threats.
“APIs don’t just power mobile apps, they expose them,” said Krishna Vishnubhotla, vice president of product solutions at Zimperium.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
“Traditional security tools can’t stop attacks happening inside the app itself. Protecting APIs now requires in-app defenses that secure the client side.”
Client-side tampering is common, as attackers can intercept and alter API calls before they reach backend systems.
Even SSL pinning, designed to prevent man-in-the-middle attacks, has gaps: nearly 1 in 3 Android finance apps and 1 in 5 iOS travel apps remain vulnerable.
Beyond API exposure, many apps mishandle sensitive data on devices, as Zimperium revealed console logging, external storage, and insecure local storage are common problems.
For example, 6% of the top 100 Android apps write personally identifiable information (PII) to console logs, and 4% write it to external storage accessible by other apps.
Even local storage, although not shared, can become a liability if an attacker gains device access.
The analysis also shows nearly a third (31%) of all apps and 37% of the top 100 send PII to remote servers, often without proper encryption.
Certain apps incorporate SDKs capable of secretly exfiltrating data, recording user interactions, capturing GPS locations, and sending information to external servers.
These hidden activities increase enterprise exposure and show that even apps from official stores can carry major security risks.
“As mobile apps continue to drive business operations and digital experiences, securing APIs from the inside out is critical to preventing fraud, data theft, and service disruption,” added Vishnubhotla.
How to stay safe
- Inspect apps for improper logging of sensitive information to prevent data leaks.
- Verify that local storage of data is encrypted and not accessible by other apps.
- Monitor network traffic to detect apps sending unencrypted personal information.
- Identify and remove malicious SDKs or third-party components embedded in apps.
- Review app permissions to ensure they align with intended functionality.
- Conduct regular audits of app behavior for potential breach vulnerabilities.
- Implement runtime protections to prevent tampering or reverse engineering of apps.
- Use code obfuscation to shield business logic and API endpoints from attackers.
- Validate that API calls come only from legitimate, untampered applications.
- Establish incident response procedures in case a mobile app compromise occurs.
- Use mobile security software that protects against malware and ransomware attacks.
You might also like
- These are the best endpoint protection tools right now
- Take a look at our pick of the best password managers
- Nvidia AI sales to reach almost $400 billion by 2028, research claims - but then things will get a bit tricky for the world's largest company

Efosa has been writing about technology for over 7 years, initially driven by curiosity but now fueled by a strong passion for the field. He holds both a Master's and a PhD in sciences, which provided him with a solid foundation in analytical thinking. Efosa developed a keen interest in technology policy, specifically exploring the intersection of privacy, security, and politics. His research delves into how technological advancements influence regulatory frameworks and societal norms, particularly concerning data protection and cybersecurity. Upon joining TechRadar Pro, in addition to privacy and technology policy, he is also focused on B2B security products. Efosa can be contacted at this email: udinmwenefosa@gmail.com
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.