Account Takeover
Credentials work from any device.
Threat Intelligence
Affected: Mobile Banking · Open Banking · Corporate Banking
Weak or missing device binding allows stolen credentials and session tokens to be used from attacker-controlled devices — enabling account takeover, credential stuffing and SIM-swap fraud.
High
ATO Risk
Without binding
Required
PSD2 Relevance
Possession factor
Common
Implementation Gap
Token-only auth
60–80%
Fraud Reduction
With strong binding
Attack chain
Typical exploitation path in mobile banking
Kill Chain
End-to-end attack timeline observed in mobile banking incidents.
Phishing, malware or breach provides login.
Session token stolen from device or MITM.
Attacker uses token without enrollment.
Full banking session on untrusted device.
Payments initiated without step-up.
Business Impact
Operational, financial and regulatory consequences for BFSI.
Credentials work from any device.
Automated login from bot farms.
OTP intercepted on attacker SIM.
Possession factor not demonstrated.
SOC Intelligence
Typical APK assessment findings mapped to this threat.
Backend cannot distinguish devices.
Easily extracted by malware.
Silent enrollment possible.
Detection
Four-phase governance pipeline — deterministic evidence only.
Phase 1
Phase 2
Phase 3
Phase 4
Mitigation
Layered defenses with coverage, effort and effectiveness ratings.
Protects: Token replay prevention
Effort
High
Effectiveness
90%
Bind refresh tokens to hardware-backed keys.
Protects: Enrollment fraud
Effort
Medium
Effectiveness
85%
In-branch, video KYC or push to registered device.
Protects: Unknown device patterns
Effort
High
Effectiveness
80%
Featurespace / BioCatch complement.
Regulatory Intel
Compliance confidence and mapped control counts per jurisdiction.
CBUAE
12 mapped controls
View mandate →RBI
9 mapped controls
View mandate →MAS
11 mapped controls
View mandate →EBA / PSD2
10 mapped controls
View mandate →FFIEC
8 mapped controls
View mandate →Framework Alignment
How this threat maps across MASVS, OWASP Mobile, PCI DSS, PSD2, NIST and DORA.
| Control | MASVS | OWASP Mobile | PCI DSS | PSD2 | NIST | DORA |
|---|---|---|---|---|---|---|
| Device binding | ◐ | ◐ | ○ | ● | ● | ◐ |
| Secure token storage | ● | ● | ● | ● | ● | ● |
Executive Summary
Board-ready risk dimensions and impact heatmap.
Lower = higher residual risk
Impact heatmap
ATO
L: 85%
I: 90%
Vendor Intel
RASP, attestation and device-trust solutions for banking programs.
Runtime app attestation
Enterprise
Banking: excellent
Pros
Limitations
CIAM + device trust
Enterprise
Banking: good
Pros
Limitations
Device fingerprinting
Enterprise
Banking: good
Pros
Limitations
APK Preview
Sample assessment output for Device Binding exposure.
Risk score
42
/ 100
2 critical findings
Observed risks
Mapped controls
Related Intel
Adjacent attack patterns
Governance standards
FAQ
SEO-optimized answers for security and governance teams.
Cryptographically associating a user session with a trusted device fingerprint so tokens cannot be replayed on attacker hardware.
PSD2 SCA requires a possession factor — device binding is the standard way mobile apps demonstrate possession.
Take action
Upload your Android banking app for evidence-backed threat intelligence — no hallucinated findings.