Security gap at Athens International Airport

Two Greek researchers Dimitris Chatzidimitris and Anastasis Vassiliadis managed to identify a security gap in the Android application of the Athens International Airport,
which allowed them to download and bypass the application's Anti-VM and Anti-Debug security, resulting in the detection of a Secret Key in the source code.


"After that we did not proceed further with a possible access to the particular service that used the Secret Key, since we had already confirmed the weakness in the security of the Android application."

Here are the details of the application where the security gap was detected:

App Name: ATH Airport
Package Name: gr.aia.athairport
File Name: ATH
Main Activity: gr.aia.athairport.AIASplashActivity
Size: 9.02MB
Target SDK: 28
Min SDK: 19
Android Version Name: 2.7.1
Android Version Code: 99
SHA256: 8b5d9374f2dc1e8e86ba21dbc8aba1b8b4091b982796eb68b027bba78b6a4063

The information remains available to those directly interested, from the researchers themselves but also from

Information about vulnerabilities discovered in organizations is considered extremely necessary (especially when they exist in websites with high traffic and contain sensitive user data), and for us at they are an immediate priority.

We hope that in this way we contribute to a safer internet. The Best Technology Site in Greecefgns

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).