Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

11/24/2020
05:00 PM
50%
50%

Baidu Apps Leaked Location Data, Machine Learning Reveals

Several apps available on the Google Play Store, including two made by Chinese Internet giant Baidu, leaked information about the phone's hardware and location without the user's knowledge, research finds.

Two popular apps from Baidu collected data on Android phones and uploaded it to the Internet, potentially allowing the apps to track the user, network security firm Palo Alto Networks stated in an analysis of the apps published on Nov. 24.

The Baidu Search Box and Baidu Maps applications, which have more than 6 million downloads from the US Google Play Store, both collected a variety of device identifiers from the phone on which the applications were installed. A third application, Homestyler - Interior Design & Decorating Ideas, also used a software development kit (SDK) that collects information on the user's device, according to the security firm's researchers.

Related Content:

Malicious Android Apps Slip Through Google Play Protection

The Changing Face of Threat Intelligence

New on The Edge: We Secured the Election. Now How Do We Secure Trust in Results?

The data collection did not appear to be malicious, just bad practice, says Jen Miller-Osborn, deputy director of threat intelligence for the Unit 42 research group at Palo Alto Networks.

"That kind of data can be used to track a person [and] establish location data points," she says. "It is not the data that people want to have collected on them without their knowledge."

Mobile apps leaking sensitive data has become a common problem. In one study published in May, researchers from Comparitech found 0.83% of the more than half million Android apps analyzed had errors in their database configurations, exposing sensitive user data. Extrapolating the findings across the Google Play Store suggests that some 24,000 applications leaked information

In March, security firm Check Point Software Technologies found 56 applications downloaded more than a million times from the Google Play Store contained malware, dubbed Tekya, that mimicked the user and clicked on ads and banners to generate revenue for the adware operators. 

"Although Google has taken steps to secure its Play store and stop malicious activity, hackers are still finding ways to infiltrate the app store and access users' devices," the researchers stated in a blog post. "Millions of mobile phone users have unintentionally downloaded malicious apps that have the ability to compromise their data, credentials, emails, text messages, and geographical location."

In the latest privacy incident, Palo Alto Networks' Unit 42 researchers found that Baidu's Android Push SDK was collecting and communicating unique identifiers from the mobile devices on which applications ran. While some information — such as the device model, carrier, screen resolution, and network — may not give away too much information, the SDK also collected the MAC address and the International Mobile Subscriber Identity (IMSI) number, which is unique for each person.

The IMSI and the International Mobile Equipment Identity (IMEI) numbers are both sensitive identifiers that can be used by cybercriminals to pose as the subscriber or the device, the researchers stated. 

"Once this data is acquired, cybercriminals can profile users and further extract sensitive information about them," they said in the blog post. "For example, if a cybercriminal gets hold of a phone's IMEI number, they could use it to report the phone as stolen and trigger the provider to disable the device and block its access to the network."

Palo Alto Networks researchers detected the surreptitious data collection using a machine learning component of a spyware detection tool, the company said.

The Google Play Store represents a lucrative target for any malware or spyware author. A malicious app that successfully escapes detection can garner millions of downloads in short order. 

Overall, two-thirds of malicious apps come from the Google Play Store, while 10% come from alternative third-party markets, according to researchers from NortonLifelock. Far from indicating the level of malicious apps in the Google Play Store, the data just underscores the dominance of Google's first-party position in the mobile ecosystem. The researchers found that the ratio of bad applications to legitimate ones was much better on the Google Play Store, 0.6%, compared with other sources, such as alternative third-party markets, which have a 3.2% chance of sourcing unwanted software.

"[U]nwanted app developers have a large incentive to make their apps appear in the Play market since it provides the apps with higher visibility, reputation, and trust," the researchers said. "This leads to a low fraction, but large number overall, of unwanted apps being able to bypass Play's defenses."

Google removed all three apps from the Play Store on Oct. 28, although Baidu fixed the Search Box app and it has since been reposted. Baidu Maps is still not available, according to Palo Alto Networks. Google's Android team acknowledged Palo Alto in a statement on the issue. 

"We appreciate the work of the research community, and companies like Palo Alto Networks, who work to strengthen the security of the Play Store. We look forward to collaborating with them on more research in the future," the team stated in the Palo Alto blog post.

 

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: George has not accepted that the technology age has come to an end.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27581
PUBLISHED: 2021-03-05
The Blog module in Kentico CMS 5.5 R2 build 5.5.3996 allows SQL injection via the tagname parameter.
CVE-2021-28042
PUBLISHED: 2021-03-05
Deutsche Post Mailoptimizer 4.3 before 2020-11-09 allows Directory Traversal via a crafted ZIP archive to the Upload feature or the MO Connect component. This can lead to remote code execution.
CVE-2021-28041
PUBLISHED: 2021-03-05
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
CVE-2021-3377
PUBLISHED: 2021-03-05
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.
CVE-2021-3420
PUBLISHED: 2021-03-05
A flaw was found in newlib in versions prior to 4.0.0. Improper overflow validation in the memory allocation functions mEMALIGn, pvALLOc, nano_memalign, nano_valloc, nano_pvalloc could case an integer overflow, leading to an allocation of a small buffer and then to a heap-based buffer overflow.