NEWYou tin present perceive to Fox News articles!
Apple often promotes the App Store arsenic a unafraid spot to download apps. The institution highlights strict reviews and a closed strategy arsenic cardinal protections for iPhone users. That estimation present faces superior questions.
New probe shows that thousands of iOS apps approved by Apple incorporate hidden information flaws. These flaws tin exposure idiosyncratic data, unreality retention and adjacent outgo systems.
The contented is not malware; it's mediocre information practices baked straight into the app code.
Sign up for my FREE CyberGuy Report
Get my champion tech tips, urgent information alerts, and exclusive deals delivered consecutive to your inbox. Plus, you'll get instant entree to my Ultimate Scam Survival Guide – escaped erstwhile you articulation my CYBERGUY.COM newsletter.
APPLE WARNS MILLIONS OF IPHONES ARE EXPOSED TO ATTACK

Cybernews researchers recovered that galore iOS apps store delicate secrets straight wrong app files, wherever they tin beryllium easy extracted. (Kurt "CyberGuy" Knutsson)
What researchers discovered wrong iOS apps
Security researchers astatine Cybernews, a cybersecurity probe firm, analyzed the codification of much than 156,000 iPhone apps. That represents astir 8% of each apps disposable worldwide.
Here is what they found:
- Over 815,000 hidden secrets wrong app code
- An mean of 5 secrets per app
- 71% of apps leaked astatine slightest 1 secret
These secrets see passwords, API keys and entree tokens. Developers spot them straight wrong apps, wherever anyone tin extract them. According to Cybernews researcher Aras Nazarovas, this makes attackers' jobs overmuch easier than astir users realize.
What are hardcoded secrets successful elemental terms?
A hardcoded concealed is delicate accusation saved straight wrong an app alternatively of being protected connected a unafraid server. Think of it similar penning your slope PIN connected the backmost of your debit card. Once idiosyncratic downloads the app, they tin inspect its files and propulsion retired those secrets. Attackers bash not request peculiar entree oregon precocious hacking tools. Both the Cybersecurity and Infrastructure Security Agency and the Federal Bureau of Investigation pass developers not to bash this. Yet it is happening astatine a monolithic scale.
Cloud retention leaks exposed immense amounts of data
One of the astir superior problems involves unreality storage. More than 78,000 iOS apps contained nonstop links to unreality retention buckets. These buckets store files specified arsenic photos, documents, receipts and backups. In immoderate cases, nary password was required astatine all. Researchers found:
- 836 retention buckets are afloat unfastened to the public
- Over 76 cardinal exposed files
- More than 406 terabytes of leaked data
This information included idiosyncratic uploads, registration details, app logs and backstage records. Anyone who knew wherever to look could presumption oregon download it.
APPLE PATCHES TWO ZERO-DAY FLAWS USED IN TARGETED ATTACKS

This illustration shows the astir communal types of hardcoded secrets recovered wrong iOS apps, with Google-related keys appearing astir often, according to Cybernews research. (Cybernews)
Firebase databases were besides near open
Many iOS apps trust connected Google Firebase to store idiosyncratic data. Cybernews recovered much than 51,000 Firebase database links hidden successful app code. While immoderate were protected, implicit 2,200 had nary authentication. That exposed:
- Nearly 20 cardinal idiosyncratic records
- Messages, profiles, and enactment logs
- Databases that are mostly hosted successful the U.S.
If a Firebase database is not locked down, attackers tin browse idiosyncratic information similar a nationalist website.
Payment and login systems were astatine hazard too
Some of the leaked secrets were acold much unsafe than analytics oregon ads. Researchers discovered concealed keys for:
- Stripe, which handles payments and refunds
- JWT authentication systems that power logins
- Order absorption tools utilized by buying apps
A leaked Stripe concealed cardinal tin let attackers to contented refunds, determination wealth oregon entree billing details. Leaked login keys tin fto attackers impersonate users oregon instrumentality implicit accounts.
AI and societal apps were among the worst offenders
Some of the apps with the largest leaks were related to artificial intelligence. According to VX Underground, information steadfast CovertLabs identified 198 iOS apps leaking idiosyncratic data. The worst known lawsuit was Chat & Ask AI by Codeway. Researchers accidental it exposed chat histories, telephone numbers and email addresses tied to millions of users. Another app, YPT - Study Group, reportedly leaked messages, idiosyncratic IDs and entree tokens. CovertLabs tracks these incidents successful a restricted repository called Firehound. The afloat database of affected apps has not been publically released, and researchers accidental the information is constricted to forestall further vulnerability and to springiness developers clip to hole information flaws.
MALICIOUS GOOGLE CHROME EXTENSIONS HIJACK ACCOUNTS

This illustration shows however delicate keys similar Google API credentials and Stripe outgo secrets tin beryllium stored straight wrong an iOS app’s files, wherever they are casual to extract. (Cybernews)
Why Apple's App reappraisal tin miss hidden information risks
Apple reviews apps earlier they look successful the App Store. However, the reappraisal process does not scan app codification for hidden secrets. If an app behaves usually during testing, it tin walk reappraisal adjacent if delicate keys are buried wrong its files. This creates a spread betwixt Apple's information claims and real-world risks. Removing leaked secrets is not elemental for developers. They indispensable revoke aged keys, make caller ones and rebuild parts of their apps. That tin interruption features and hold updates. Even though Apple says astir app updates are reviewed wrong 24 hours, immoderate updates instrumentality weeks. During that time, susceptible apps tin stay available.
CyberGuy contacted Apple for comment, but did not person a effect earlier publication.
Ways to enactment harmless close now
You cannot easy inspect an app for hidden secrets. Apple does not supply tools for that. Still, you tin trim your hazard and bounds vulnerability by being selective and cautious. These steps assistance trim the hazard if an app leaks information down the scenes.
1) Stick to established app developers
Well-known developers thin to person stronger information teams and amended update practices. Smaller oregon chartless apps whitethorn unreserved features to marketplace and place information basics. Before downloading, cheque however agelong the developer has been progressive and however often the app is updated.
2) Review and bounds app permissions
Many apps inquire for much entree than they need. Location, contacts, photos and microphone entree each summation the hazard of information leaks. Go into your iPhone settings and region permissions that are not indispensable for the app to work.
3) Delete apps you nary longer use
Unused apps inactive clasp entree to information you shared successful the past. They whitethorn besides store accusation connected distant servers agelong aft you halt opening them. If you person not utilized an app successful months, region it. Here's how: Open Settings, pat General, prime iPhone Storage, and scroll done the database of apps to spot erstwhile each 1 was past used. Tap immoderate app you nary longer request and prime Delete App to region it and trim ongoing information exposure.
4) Be cautious with idiosyncratic and fiscal details
Avoid entering delicate accusation unless it is perfectly necessary. This includes afloat names, addresses, outgo details and backstage conversations. AI apps are particularly risky if you stock profoundly idiosyncratic content.
5) Use a password manager for each account
A password manager creates strong, unsocial passwords for each app and service. This prevents attackers from accessing aggregate accounts if 1 app leaks data. Never reuse passwords tied to your email address.
Next, spot if your email has been exposed successful past breaches. Our No. 1 password manager prime includes a built-in breach scanner that checks whether your email code oregon passwords person appeared successful known leaks. If you observe a match, instantly alteration immoderate reused passwords and unafraid those accounts with new, unsocial credentials.
Check retired the champion expert-reviewed password managers of 2026 astatine Cyberguy.com.
6) Change passwords tied to exposed apps
If an app uses your email code for login, alteration that password immediately. Do this adjacent if determination is nary confirmation of a breach. Attackers often trial leaked credentials crossed different services.
7) Consider utilizing a information removal service
Some leaked information ends up with information brokers that merchantability idiosyncratic accusation online. A information removal work tin assistance find and region your details from these databases. This reduces the accidental that exposed app information gets reused for scams oregon individuality theft.
While nary work tin warrant the implicit removal of your information from the internet, a information removal work is truly a astute choice. They aren't cheap, and neither is your privacy. These services bash each the enactment for you by actively monitoring and systematically erasing your idiosyncratic accusation from hundreds of websites. It's what gives maine bid of caput and has proven to beryllium the astir effectual mode to erase your idiosyncratic information from the internet. By limiting the accusation available, you trim the hazard of scammers cross-referencing information from breaches with accusation they mightiness find connected the acheronian web, making it harder for them to people you.
Check retired my apical picks for information removal services and get a escaped scan to find retired if your idiosyncratic accusation is already retired connected the web by visiting Cyberguy.com.
Get a escaped scan to find retired if your idiosyncratic accusation is already retired connected the web: Cyberguy.com.
8) Monitor your accounts for antithetic activity
Watch for unexpected emails, password reset notices, login alerts, oregon outgo confirmations. These tin awesome that leaked information is already being abused. Act rapidly if thing looks off.
9) Pause usage of risky AI and chat apps
If you usage AI apps for backstage conversations, see stopping until the developer confirms information fixes. Once information is exposed, it cannot beryllium pulled back. Avoid sharing delicate details with apps that store conversations remotely.
Kurt's cardinal takeaways
Apple's App Store inactive offers important protections, but this probe shows it is not foolproof. Many trusted iPhone apps softly exposure information owed to basal information mistakes. Until app reviews improve, you request to enactment alert and bounds however overmuch information you share.
How galore apps connected your iPhone person entree to accusation you would not privation exposed? Let america cognize by penning to america astatine Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my champion tech tips, urgent information alerts, and exclusive deals delivered consecutive to your inbox. Plus, you’ll get instant entree to my Ultimate Scam Survival Guide – escaped erstwhile you articulation my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Kurt "CyberGuy" Knutsson is an award-winning tech writer who has a heavy emotion of technology, cogwheel and gadgets that marque beingness amended with his contributions for Fox News & FOX Business opening mornings connected "FOX & Friends." Got a tech question? Get Kurt’s escaped CyberGuy Newsletter, stock your voice, a communicative thought oregon remark astatine CyberGuy.com.










English (CA) ·
English (US) ·
Spanish (MX) ·