{"id":13305,"date":"2018-09-07T10:10:07","date_gmt":"2018-09-07T18:10:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/09\/07\/news-7072\/"},"modified":"2018-09-07T10:10:07","modified_gmt":"2018-09-07T18:10:07","slug":"news-7072","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/09\/07\/news-7072\/","title":{"rendered":"Mac App Store apps are stealing user data"},"content":{"rendered":"<p><strong>Credit to Author: Thomas Reed| Date: Fri, 07 Sep 2018 17:08:24 +0000<\/strong><\/p>\n<p>There is a concerning trend lately in the Mac App Store. Several security researchers have independently found different apps that are collecting sensitive user data and uploading it to servers controlled by the developer. (This is referred to as <em>exfiltrating\u00a0<\/em>the data.) Some of this data is actually being sent to Chinese servers, which may not be subject to the same stringent requirements around storage and protection of personally identifiable information like organizations based in the US or EU.<\/p>\n<h3>Adware Doctor<\/h3>\n<p>Patrick Wardle has recently posted an article\u00a0detailing the <a href=\"https:\/\/objective-see.com\/blog\/blog_0x37.html\" target=\"_blank\" rel=\"noopener\">misbehavior of an app named Adware Doctor<\/a>, which is exfiltrating the following data:<\/p>\n<ul>\n<li>Safari history<\/li>\n<li>Chrome history<\/li>\n<li>Firefox history<\/li>\n<li>A list of all running processes<\/li>\n<li>A list of software that you have downloaded and from where<\/li>\n<\/ul>\n<p>Most of this is data that App Store apps should not be accessing, much less exfiltrating. In the case of the list of running processes, the app had to work around blockages that Apple has in place to prevent such apps from accessing that data. The developers found a loophole that allowed them to access that data despite Apple&#8217;s restrictions.<\/p>\n<p>The developer of this app is one that we at Malwarebytes have had our eye on since 2015. At that time, we discovered an app on the App Store named Adware Medic\u2014a direct rip-off of my own highly-successful app of the same name, which became <a href=\"http:\/\/www.malwarebytes.com\/mac\" target=\"_blank\" rel=\"noopener\">Malwarebytes for Mac<\/a>. We immediately began detecting this, and contacted Apple about removing the app. It was eventually removed, but was replaced soon after by an identical app named Adware Doctor.<\/p>\n<p>We&#8217;ve continued to fight against this app, as well as others made by the same developer, and it has been taken down several times now, but in a continued failure of Apple&#8217;s review process, is always replaced by a new version before long.<\/p>\n<h3>Open Any Files: <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/rar\/\" target=\"_blank\" rel=\"noopener\">RAR<\/a> Support<\/h3>\n<p>This app came onto our radar late last year. We&#8217;ve seen a number of different scam applications like this, which hijack the system&#8217;s functionality for handling documents that the user does not have an appropriate app to open, as a means for advertising other products\u2026most often scams. The typical behavior is that, when the user opens an unfamiliar file, this app (and others like it) opens and promotes some antivirus software for scanning the file or the computer, often telling the user that they might be unable to open the file because they are infected.<\/p>\n<p>Interestingly, this software was designed to promote a what appeared to be a mainstream antivirus product. This seemed like an abuse of an affiliate program for that product.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Open-Any-Files.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25400\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mac-app-store-apps-are-stealing-user-data\/attachment\/open-any-files\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Open-Any-Files.png\" data-orig-size=\"2048,1612\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Open Any Files\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Open-Any-Files-300x236.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Open-Any-Files-600x472.png\" class=\"aligncenter size-large wp-image-25400\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Open-Any-Files-600x472.png\" alt=\"\" width=\"600\" height=\"472\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Open-Any-Files-600x472.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Open-Any-Files-300x236.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>It turned out that this app&#8217;s behavior was very similar to the current behavior of Adware Doctor. It was uploading a file named file.zip to the following URL:<\/p>\n<pre>update.appletuner.trendmicro.com\/1\/upload\/search_keywords\/<\/pre>\n<p>This file contained the following data:<\/p>\n<ul>\n<li>Complete Safari browsing and search history<\/li>\n<li>Complete Chrome browsing and search history<\/li>\n<li>Complete Firefox browsing and search history<\/li>\n<li>Complete App Store browsing history<\/li>\n<\/ul>\n<p>We reported this app to Apple in December 2017. It is still present on the App Store.<\/p>\n<p>As we were investigating, we found it very odd that Open Any Files was promoting Dr. Antivirus on the App Store. This led us to investigate Dr. Antivirus, as well as a number of other apps.<\/p>\n<p>(Recently, Open Any Files stopped exfiltrating this data, but we have retained the evidence from our observations.)<\/p>\n<h2>Dr. Antivirus<\/h2>\n<p>On investigating, we learned that this app, like most Mac App Store apps, is limited in what it can detect to begin with, due to restrictions imposed by the App Store. However, even within the user folder, most of antivirus apps in the App Store don&#8217;t have a good detection rate, and this was no exception.<\/p>\n<p>Worse, however, was that we observed the same pattern of data exfiltration as seen in Open Any Files! We saw the same data being collected and also uploaded in a file named file.zip to the same URL used by Open Any Files.<\/p>\n<p>This file, though, contained an interesting bonus. In addition to the browsing history, it also contained an interesting file named app.plist, which contained detailed information about every application found on the system. (See a short excerpt from the file below, showing only the information listed for Dr. Antivirus.)<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Dr.-Antivirus-exfiltration.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25401\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mac-app-store-apps-are-stealing-user-data\/attachment\/dr-antivirus-exfiltration\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Dr.-Antivirus-exfiltration.png\" data-orig-size=\"1218,696\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Dr. Antivirus exfiltration\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Dr.-Antivirus-exfiltration-300x171.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Dr.-Antivirus-exfiltration-600x343.png\" class=\"aligncenter size-large wp-image-25401\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Dr.-Antivirus-exfiltration-600x343.png\" alt=\"\" width=\"600\" height=\"343\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Dr.-Antivirus-exfiltration-600x343.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Dr.-Antivirus-exfiltration-300x171.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Dr.-Antivirus-exfiltration.png 1218w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>It could be argued that all of this information could be useful for antivirus software to collect. However, there was nothing in the app to inform the user about this data collection, and there was no way to opt out of this data collection.<\/p>\n<h2>Dr. Cleaner<\/h2>\n<p>Unfortunately, other apps by the same developer are also collecting this data. We observed the same data being collected by Dr. Cleaner, minus the list of installed applications. There is really no good reason for a &#8220;cleaning&#8221; app to be collecting this kind of user data, even if the users were informed, which was not the case.<\/p>\n<p>Interestingly, we found that the drcleaner[dot]com website was being used to promote these apps. WHOIS records identified an individual living in China, and having a foxmail.com email address, as being the registered owner of the domain.<\/p>\n<h3>What does all this mean?<\/h3>\n<p>It&#8217;s blindingly obvious at this point that the Mac App Store is not the safe haven of reputable software that Apple wants it to be. I&#8217;ve been saying this for several years now, as we&#8217;ve been detecting junk software in the App Store for almost as long as I&#8217;ve been at Malwarebytes. This is not new information, but these issues reveal a depth to the problem that most people are unaware of.<\/p>\n<p>We&#8217;ve reported software like this to Apple for years, via a variety of channels, and there is rarely any immediate effect. In some cases, we&#8217;ve seen offending apps removed quickly, although sometimes\u00a0 those same apps have come back quickly (as was the case with Adware Doctor). In other cases, it has taken as long as six months for a reported app to be removed.<\/p>\n<p>In many cases, apps that we have reported are still in the store. Case in point\u2026all of the above.<\/p>\n<p>I strongly encourage you to treat the App Store just like you would any other download location: as potentially dangerous. Be cautious of what you download. A free app from the App Store may seem perfectly innocent and harmless, but if you have to give that app access to any of your data as part of its expected functionality, you can&#8217;t know how it will use that data. Worse, even if you don&#8217;t give it access, it may find a loophole and get access to sensitive data anyway.<\/p>\n<p>If you download one of these apps and are now regretting it, you can report the app to Apple:<\/p>\n<p><a href=\"https:\/\/reportaproblem.apple.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/reportaproblem.apple.com<\/a><\/p>\n<h3>Special thanks<\/h3>\n<p>Thanks go to folks who have spent their spare time finding and poking at these applications over the last year: PeterNopSled (from the Malwarebytes forums), <a href=\"https:\/\/twitter.com\/privacyis1st\" target=\"_blank\" rel=\"noopener\">@privacyis1st<\/a>, and <a href=\"https:\/\/twitter.com\/patrickwardle\" target=\"_blank\" rel=\"noopener\">Patrick Wardle<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mac-app-store-apps-are-stealing-user-data\/\">Mac App Store apps are stealing user data<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mac-app-store-apps-are-stealing-user-data\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Thomas Reed| Date: Fri, 07 Sep 2018 17:08:24 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mac-app-store-apps-are-stealing-user-data\/' title='Mac App Store apps are stealing user data'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/shutterstock_1128201137.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>There are several apps in the Mac App Store that are collecting data about users that they should not be collecting. Here&#8217;s what you need to know.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/mac-threat-analysis\/\" rel=\"category tag\">Mac<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/adware-doctor\/\" rel=\"tag\">Adware Doctor<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/adware-medic\/\" rel=\"tag\">Adware Medic<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/app-store\/\" rel=\"tag\">App Store<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/apple\/\" rel=\"tag\">Apple<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/dr-antivirus\/\" rel=\"tag\">Dr. Antivirus<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mac\/\" rel=\"tag\">mac<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mac-app-store\/\" rel=\"tag\">Mac App Store<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/macos\/\" rel=\"tag\">macOS<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malwarebytes-for-mac\/\" rel=\"tag\">Malwarebytes for Mac<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile\/\" rel=\"tag\">Mobile<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pup\/\" rel=\"tag\">PUP<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rar-file\/\" rel=\"tag\">RAR file<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mac-app-store-apps-are-stealing-user-data\/' title='Mac App Store apps are stealing user data'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mac-app-store-apps-are-stealing-user-data\/\">Mac App Store apps are stealing user data<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[19427,19428,16484,2211,19429,10454,12095,10403,14021,10554,10566,19430,10494],"class_list":["post-13305","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-adware-doctor","tag-adware-medic","tag-app-store","tag-apple","tag-dr-antivirus","tag-mac","tag-mac-app-store","tag-macos","tag-malwarebytes-for-mac","tag-mobile","tag-pup","tag-rar-file","tag-threat-analysis"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13305","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13305"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13305\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}