Man-in-the-Middle
Full API visibility on banking channels.
Threat Intelligence
Affected: Mobile Banking · Open Banking · Payments · Wallets
Without certificate or public-key pinning, attackers intercept HTTPS traffic using rogue CAs, corporate proxies, or Frida SSL-kill-switch — exposing tokens, PII, and transaction payloads.
Low
Attack Complexity
With rooted device + proxy
8.8/10
Exploitability
Well-documented tooling
Critical
Fraud Risk
Session + API theft
High
Regulatory Impact
MASVS L2 requirement
Attack chain
Typical exploitation path in mobile banking
Kill Chain
End-to-end attack timeline observed in mobile banking incidents.
Attacker on same Wi-Fi or controls DNS/proxy.
User installs attacker CA or uses rooted trust store.
Proxy terminates TLS — sees plaintext API calls.
Bearer tokens, refresh tokens and cookies stolen.
Attacker replays authenticated API calls from another host.
Business Impact
Operational, financial and regulatory consequences for BFSI.
Full API visibility on banking channels.
Long-lived tokens enable persistent ATO.
Balances, payees and amounts visible in transit.
MASVS-NETWORK and PCI DSS transmission failures.
Third-party API credentials exposed.
SOC Intelligence
Typical APK assessment findings mapped to this threat.
No pin on auth or payment API hosts.
Custom TrustManager accepts any cert.
usesCleartextTraffic or HTTP endpoints.
Cert rotation will break app or force pin removal.
Payment APIs unprotected.
Detection
Four-phase governance pipeline — deterministic evidence only.
Phase 1
Phase 2
Phase 3
Phase 4
Mitigation
Layered defenses with coverage, effort and effectiveness ratings.
Protects: MITM on banking APIs
Effort
Medium
Effectiveness
90%
Pin SPKI hashes; maintain backup pins for rotation.
Protects: Cleartext blocking
Effort
Low
Effectiveness
85%
Android NSC must disallow cleartext in production.
Protects: Runtime cert + app attestation
Effort
High
Effectiveness
93%
Strong for open banking and high-value APIs.
Protects: Fraudulent cert detection
Effort
Medium
Effectiveness
65%
Server-side complement to client pinning.
Regulatory Intel
Compliance confidence and mapped control counts per jurisdiction.
CBUAE
12 mapped controls
View mandate →RBI
9 mapped controls
View mandate →MAS
11 mapped controls
View mandate →EBA / PSD2
10 mapped controls
View mandate →FFIEC
8 mapped controls
View mandate →Framework Alignment
How this threat maps across MASVS, OWASP Mobile, PCI DSS, PSD2, NIST and DORA.
| Control | MASVS | OWASP Mobile | PCI DSS | PSD2 | NIST | DORA |
|---|---|---|---|---|---|---|
| Certificate pinning | ● | ● | ◐ | ◐ | ● | ◐ |
| TLS 1.2+ | ● | ● | ● | ● | ● | ● |
| No cleartext | ● | ● | ● | ● | ● | ● |
| Session binding | ◐ | ◐ | ● | ● | ● | ● |
Executive Summary
Board-ready risk dimensions and impact heatmap.
Lower = higher residual risk
Impact heatmap
MITM
L: 88%
I: 92%
Token theft
L: 82%
I: 90%
API abuse
L: 75%
I: 88%
PII exposure
L: 80%
I: 85%
Financial loss
L: 70%
I: 90%
Vendor Intel
RASP, attestation and device-trust solutions for banking programs.
Native Android pinning
Platform / Free
Banking: baseline
Pros
Limitations
Cross-platform pinning
Mid-market
Banking: good
Pros
Limitations
Strong API integrity
Enterprise
Banking: excellent
Pros
Limitations
Mobile threat defense
Enterprise
Banking: good
Pros
Limitations
APK Preview
Sample assessment output for SSL Pinning exposure.
Risk score
28
/ 100
2 critical findings
Observed risks
Mapped controls
Related Intel
Adjacent attack patterns
Governance standards
FAQ
SEO-optimized answers for security and governance teams.
Yes — MASVS L2 and most banking regulators require certificate or public-key pinning for API communications beyond standard TLS.
Frida scripts (ssl-kill-switch2) hook SSL verification methods. Pinning must be combined with RASP and runtime integrity checks.
Certificate pinning pins the entire cert; public key pinning pins the SPKI hash and survives cert renewal if the same key is used.
Static analysis maps TLS stacks, pin configurations, and cleartext endpoints per API host with evidence artifacts.
Take action
Upload your Android banking app for evidence-backed threat intelligence — no hallucinated findings.