Session Replay Fraud
Persistent access without credentials.
Threat Intelligence
Affected: Mobile Banking · Open Banking
Attackers steal session tokens or refresh tokens to impersonate authenticated users — bypassing login entirely through MITM, malware or insecure local storage.
MITM + Malware
Common Vector
AUTH + STORAGE
MASVS
P0
Fix Priority
Attack chain
Typical exploitation path in mobile banking
Kill Chain
End-to-end attack timeline observed in mobile banking incidents.
MITM or malware extracts bearer token.
Token used from attacker environment.
Transfers and data access without login.
Business Impact
Operational, financial and regulatory consequences for BFSI.
Persistent access without credentials.
SOC Intelligence
Typical APK assessment findings mapped to this threat.
Plaintext session storage.
Sessions never expire.
Detection
Four-phase governance pipeline — deterministic evidence only.
Phase 1
Phase 2
Phase 3
Phase 4
Mitigation
Layered defenses with coverage, effort and effectiveness ratings.
Protects: Local token theft
Effort
Medium
Effectiveness
90%
Android Keystore / iOS Keychain only.
Protects: Abandoned session abuse
Effort
Low
Effectiveness
80%
5–15 min idle for banking.
Protects: Cross-device replay
Effort
High
Effectiveness
92%
Bind refresh token to device key.
Regulatory Intel
Compliance confidence and mapped control counts per jurisdiction.
CBUAE
12 mapped controls
View mandate →RBI
9 mapped controls
View mandate →MAS
11 mapped controls
View mandate →EBA / PSD2
10 mapped controls
View mandate →FFIEC
8 mapped controls
View mandate →Framework Alignment
How this threat maps across MASVS, OWASP Mobile, PCI DSS, PSD2, NIST and DORA.
| Control | MASVS | OWASP Mobile | PCI DSS | PSD2 | NIST | DORA |
|---|---|---|---|---|---|---|
| Device binding | ◐ | ◐ | ○ | ● | ● | ◐ |
| Secure token storage | ● | ● | ● | ● | ● | ● |
Executive Summary
Board-ready risk dimensions and impact heatmap.
Lower = higher residual risk
Impact heatmap
Session abuse
L: 85%
I: 92%
Vendor Intel
RASP, attestation and device-trust solutions for banking programs.
Runtime app attestation
Enterprise
Banking: excellent
Pros
Limitations
CIAM + device trust
Enterprise
Banking: good
Pros
Limitations
Device fingerprinting
Enterprise
Banking: good
Pros
Limitations
APK Preview
Sample assessment output for Session Hijacking exposure.
Risk score
32
/ 100
2 critical findings
Observed risks
Mapped controls
Related Intel
Adjacent attack patterns
FAQ
SEO-optimized answers for security and governance teams.
Use short idle timeouts (5–15 minutes) with re-authentication for sensitive operations. Refresh tokens must be device-bound.
Take action
Upload your Android banking app for evidence-backed threat intelligence — no hallucinated findings.