Whileanalyzing popular dating apps, Kaspersky Lab researchers have found that some transmit unencrypted user data over the insecure HTTP protocol,risking the exposure of user data. This is because some applications use third party ready-to-go advertising SDKs, which are part of some of the most popular advertising networks. The apps involved include some with several billion installations worldwide, and a serious security flaw means private data could be intercepted, modified, and used in further attacks, leaving many users defenseless.
An SDK is a set of development tools, often distributed free of charge, which allows software authors to focus on the main elements of an application, while entrusting other features to ready-to-go SDKs. Developers often use third party code to save time by reusing existing functionality to create part of the application. For instance, advertising SDKs collect user data in order to show relevant ads, thus helping developers to monetize their product. The kits send user data to the domains of popular advertising networks for more targeted ad displaying.
But deeper analysis of applications has shown that data is sent unencrypted, and over HTTP, which means it is unprotected when it travels to the servers. Due to the absence of encryption, data can be intercepted by anyone – via unprotected Wi-Fi, by the Internet Service Provider or through malware on a home router. Worse still, the intercepted data can also be modified, meaning the application will show malicious ads instead of legitimate ones. Users will then be enticed to download a promoted application, which will turn out to be malware and put them at risk.
Kaspersky Lab researchers have examined logs and network traffic of applications in the internal Android Sandbox to uncover which applications transmit unencrypted user data to networks over HTTP. They identified a number of major domains, most of them part of popular advertising networks. The number of applications using these SDKs totals several million, with most of them transmitting at least one of the following pieces of data in an unencrypted way:
“The scale of what we first thought was just some specific cases of careless application design is overwhelming. Millions of applications include third party SDKs, exposing private data that can be easily intercepted and modified – leading to malware infections, blackmail and other highly effective attack vectors on your devices,” said Roman Unuchek, security researcher at Kaspersky Lab.
Kaspersky Lab researchers advise users to follow these measures:
To learn more about third party SDKs, read our blogpost on Securelist.com.
We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.