2016-09-16
Länk

Xiaomis bakdörr rakt in i kundernas telefoner

The Hacker News:

With the same curiosity to find answers to these questions, a Computer Science student and security enthusiast from Netherlands who own a Xiaomi Mi4 smartphone started an investigation to know the purpose of a mysterious pre-installed app, dubbed AnalyticsCore.apk, that runs 24×7 in the background and reappeared even if you delete it.

Xiaomi is one of the world’s largest smartphone manufacturers, which has previously been criticized for spreading malware, shipping handsets with pre-loaded spyware/adware and forked version of Android OS, and secretly stealing users’ data from the device without their permission.

After asking about the purpose of AnalyticsCore app on company’s support forum and getting no response, Thijs Broenink reverse engineered the code and found that the app checks for a new update from the company’s official server every 24 hours.

While making these requests, the app sends device identification information with it, including phone’s IMEI, Model, MAC address, Nonce, Package name as well as signature.

If there is an updated app available on the server with the filename “Analytics.apk,” it will automatically get downloaded and installed in the background without user interaction.
Open is better.

Macpro är annonsfri för att göra din läsupplevelse bättre.
Läs mer här om hur du hjälper Macpro förbli annonsfri

© 2004 - 2016 Joacim Melin