Apps on Google Play with 1.5 Million Installs Were Transferring User Data to China

Apps on Google Play
Two malicious file management apps have been found on Google Play with over 1.5 million installations in total.

They collected a lot of user data, far beyond the information they needed for their work, and then sent the collected information to China.

Recall that we also reported that the US authorities published a list of vulnerabilities that are most often exploited by Chinese hackers, but there is information that the policy of the Chinese authorities encourages the collection of vulnerabilities for attacks by Western companies.

The media also wrote that the United States and Britain accused Chinese government hackers of attacking Microsoft Exchange servers.

Researchers at mobile threat company Pradeo report that the first app was called File Recovery and Data Recovery (com.spot.music.filedate) and had at least a million installs. The second application, called File Manager (com.file.box.master.gkd), had at least 500,000 downloads. Both have now been removed from the Google Play Store.

Apps on Google Play

Both apps were published by the same publisher (wang tom). Their description, in the Data Safety section, states that they do not collect any user data, but this was a misinformation.

Apps on Google Play

Analysts write that in fact, applications extracted the following information and transmitted it to servers located in China:

  1. a list of contacts from the device’s memory, as well as data on connected e-mail and social networking accounts;
  2. images, audio, and video that have been manipulated or restored through malicious applications;
  3. real-time user location;
  4. mobile country code;
  5. the name of the telecom operator;
  6. network code of the SIM provider;
  7. operating system version;
  8. make and model of the device.

Although some applications may collect such data in order to work, file managers obviously did not need this. Worse, the information was collected secretly and without the consent of users.

The researchers add that apps have hidden their icons from the home screen to make them harder to find and remove. They could also abuse the permissions the user gave them during installation to reboot the device and run in the background.

Experts believe that the creator of these applications used emulators or bot farms to increase the number of installations and increase the popularity of their products. This theory is backed up by the low number of reviews on Google Play, which clearly didn’t match the app’s huge user base.

Sending
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

About the author

Volodymyr Krasnogolovy

I'm a journalist, cybersecurity specialist, content manager, copywriter, and photojournalist. With a deep passion for cybersecurity and a diverse skill set, I'm excited to share my expertise through this blog. From researching the latest threats to crafting engaging narratives and capturing powerful visuals, I strive to provide valuable insights and raise awareness about the importance of cybersecurity.

Leave a Reply

Sending