{"id":12051,"date":"2018-04-17T14:30:39","date_gmt":"2018-04-17T22:30:39","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/04\/17\/news-5820\/"},"modified":"2018-04-17T14:30:39","modified_gmt":"2018-04-17T22:30:39","slug":"news-5820","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/04\/17\/news-5820\/","title":{"rendered":"Leaking ads"},"content":{"rendered":"<p><strong>Credit to Author: Julia Glazova| Date: Tue, 17 Apr 2018 21:15:30 +0000<\/strong><\/p>\n<p>We have <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/android-app-security\/18505\/\">repeatedly warned<\/a> our readers about the <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/browser-extensions-security\/20886\/\">dangers<\/a> posed by programs of unknown origin. But most people seem to have no qualms about trusting apps from reliable developers and reliable sources: Positive ratings, millions of downloads, and distribution through official stores like Google Play are seen as a badge of security. However, there are no guarantees.<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/04\/17080611\/leaking-ads-featured4.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/04\/17080611\/leaking-ads-featured4-1024x672.jpg\" alt=\"\" width=\"1024\" height=\"672\" class=\"aligncenter size-large wp-image-22084\" \/><\/a><\/p>\n<p>This article is not about Trojans, but about bona fide apps that can nevertheless leak your data online. Our experts <a target=\"_blank\" href=\"https:\/\/securelist.com\/leaking-ads\/85239\/\">studied a total of 13 million APKs<\/a> (Android application packages) and found that roughly a quarter of them transmit unencrypted data over the Internet. Some of these apps boasted hundreds of millions of downloads, sometimes more than half a billion! This isn&#8217;t a small problem.<\/p>\n<p>Information sometimes leaks online because of a developer mistake, but that&#8217;s not how it happens in most cases. If called upon to send user data to a server, most apps use the secure HTTPS protocol, which prevents outsiders from intercepting the data. The problem lies in the third-party services that developers plug in without background checks. For example, some analytics or advertising services transmit information over the Internet, but using the standard HTTP protocol, which is not secure.<\/p>\n<p><strong><\/p>\n<h2>What information might be affected?<\/h2>\n<p><\/strong><\/p>\n<p>Most of the data leakage we detected had to do with the device model, its technical specification, network or ISP-related data, and the APK name (by which the system recognizes the package); many services also leaked the smartphone or tablet coordinates.<\/p>\n<p>In some cases, information about app usage was transmitted over HTTP by an embedded third-party service. This information included likes, posts, pages visited, and so forth, as well as details about the owner of the gadget \u2014 name, phone number, date of birth. Unique keys created for each authorization request were also often found to be transferred insecurely. Fortunately, most services do not transmit logins and passwords in unencrypted form, although some did.<\/p>\n<blockquote class=\"twitter-pullquote\">\n<p>One in four mobile apps transmits a portion of your personal data over an unprotected channel<\/p>\n<p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fd1zk&#038;text=One+in+four+mobile+apps+transmits+a+portion+of+your+personal+data+over+an+unprotected+channel\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\">Tweet<\/a><\/p><\/blockquote>\n<p><strong><\/p>\n<h3>What&#8217;s dangerous about that?<\/h3>\n<p><\/strong><\/p>\n<p>Information transmitted over HTTP is sent as plain text, allowing almost anyone to read it \u2014 including your ISP, for example. What&#8217;s more, the path from the app to the third-party server is likely to have several &#8220;transit points&#8221; in the form of devices that receive and store information for a certain period of time.<\/p>\n<p>Any network equipment, including your home router, may be vulnerable. If hacked, it will give the attackers access to your information. (The ISP, meanwhile, can view that without having to hack anything.) And obtaining some information about the gadget (specifically IMEI and IMSI numbers) is enough to monitor your further actions. The more complete the information, the more of an open book you are to outsiders \u2014 from advertisers to fake friends offering malicious files for download.<\/p>\n<p>However, leaks of device and user data are only part of the problem; unencrypted information can also be substituted. For example, in response to an HTTP request from an app, the server might return a video ad, which cybercriminals can intercept and replace with a less innocuous version. Or they might simply change the link inside an ad \u2014 and instead of a cute game or deal aggregator, the user risks downloading something far more nefarious.<\/p>\n<p><strong><\/p>\n<h2>What can you do?<\/h2>\n<p><\/strong><\/p>\n<p>These issues should really be tackled by app developers. But they can&#8217;t be completely trusted to handle the task, so we&#8217;ve got a few simple tips to keep you and your data better protected.<\/p>\n<ul>\n<li>Check the permissions an app requests \u2014 it may take time, but it&#8217;s never a waste of time, even if the app has millions of downloads to its name. If, say, a messaging app wants to know your location, don&#8217;t be bullied into revealing it. See <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/android-permissions-guide\/14014\/\">here<\/a> for more details about Android permissions.<\/li>\n<li>Buy paid versions of apps, money permitting. They don&#8217;t show ads, which means less risk of data leakage. However, they can still make use of third-party analytical modules, which often behave no better.<\/li>\n<li>Use a VPN \u2014 this secure connection will protect your data even if the developers can&#8217;t. For example, <a href=\"https:\/\/www.kaspersky.com\/secure-connection?redef=1&#038;reseller=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____vpn___\" target=\"_blank\">Kaspersky Secure Connection<\/a> is just the ticket.<\/li>\n<\/ul>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"ksec\" \/> <br \/><a href=\"https:\/\/www.kaspersky.com\/blog\/leaking-ads\/22074\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Julia Glazova| Date: Tue, 17 Apr 2018 21:15:30 +0000<\/strong><\/p>\n<p>Even very popular apps display ads using third-party code, which can transmit personal data unencrypted.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[18139,18140,11147,15700,3493,11066,5897,714,10438],"class_list":["post-12051","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-klrsac18","tag-rsac2018","tag-advertising","tag-data-leaks","tag-kaspersky-lab","tag-mobile-apps","tag-privacy","tag-security","tag-threats"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12051","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12051"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12051\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12051"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12051"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12051"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}