Säkerhetslucka i HTC-telefoner läcker användardata till applikationer

Artem Russakovski:

In recent updates to some of its devices, HTC introduces a suite of logging tools that collected information. Lots of information. LOTS. Whatever the reason was, whether for better understanding problems on users’ devices, easier remote analysis, corporate evilness – it doesn’t matter. If you, as a company, plant these information collectors on a device, you better be DAMN sure the information they collect is secured and only available to privileged services or the user, after opting in.

That is not the case. What Trevor found is only the tip of the iceberg – we are all still digging deeper – but currently any app on affected devices that requests a single android.permission.INTERNET (which is normal for any app that connects to the web or shows ads) can get its hands on:

the list of user accounts, including email addresses and sync status for each

last known network and GPS locations and a limited previous history of locations

phone numbers from the phone log

SMS data, including phone numbers and encoded text (not sure yet if it’s possible to decode it, but very likely)

system logs (both kernel/dmesg and app/logcat), which includes everything your running apps do and is likely to include email addresses, phone numbers, and other private info

Detta tycks inte vara något som förekommer i alla Android-baserade telefoner utan endast i HTC:s modeller. Otroligt obehagligt, hur som helst.

(Länk via Daring Fireball)

© 2019 Omsoc Publishing AB