• Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
Blog - Creative Collaboration
No Result
View All Result
Home Android

Google Play Store boots apps loaded with hidden data-harvesting software linked to US intelligence

April 7, 2022
Share on FacebookShare on Twitter

Don’t make creepy apps, y’all


Malicious software, AKA malware, is a huge problem for anyone who ends up saddled with it. It’s not just the bad guys who are hiding software that can harm us, though. Some seemingly legitimate companies are doing things like collecting personal information without the user’s knowledge or consent. It’s far from the first case of malware slipping into the Play Store, but it looks like Google, at least, is doing something about this privacy violation after learning about a number of problematic Android apps in the Play Store.

The search giant has taken measures to boot apps with hidden data-harvesting software out of the store, according to a recent Wall Street Journal report. Measurement Systems S. de R.L, a Panamanian company that works with US security agencies, wrote the code. Measurement Systems also has links to a Virginia defense contractor that specializes in cyberdefense. According to the WSJ report, the behavior was found by researchers auditing Android apps while looking for vulnerabilities. The data-harvesting code reportedly ran on millions of Android devices and has been detected in well-known consumer apps, Muslim prayer apps, an app for detecting highway speed traps, and a QR code reader. The researchers shared their findings with federal privacy officials, the WSJ, and Google.

ANDROIDPOLICE VIDEO OF THE DAY

The Panamanian firm reportedly paid developers to include its software development kit (SDK) code in their applications, and the kit handled data collection. The WSJ reports that it was able to look at data from a third-party company that showed the geographic distribution of users whose phones were running the Measurement Systems SDK, and it learned from the researchers that the buried code could obtain information down to location in addition to extracting info like email and phone numbers. The SDK could also view hashed data from WhatsApp image folders and even pull data about nearby computers and mobile devices, potentially mapping out who people meet with on a regular basis.

According to the Journal, Measurement Systems also used a subsidiary called Packet Forensics LLC to do business with the US government. While national security agencies and the Defense Department have admitted they buy commercial provider data like this to help with threat analysis, the finer details of what they get and how they use it remain secret. Governments have been collecting location-analytics information logged by mobile software for some time, sometimes asking firms to turn over bulk loads of user data to law enforcement agencies. The thing is, it can pay off for developers. According to documents seen by the paper, Measurement Systems claimed devs could rake in anywhere from $100 to $10,000 per month as long as they delivered enough users with apps accessing location data.

Serge Egelman, who with his colleague Joel Reardon discovered the hidden software, said there’s an old-fashioned lesson for developers who popped Measurement Systems code in their apps looking to make some money. It’s about “the importance of not accepting candy from strangers.” After all, it might be poisoned with code that wants to tell the government everything it can find out about you and your users. Still, there is some hope for those who have lost income streams from Google‘s ban. The company may allow some apps to return — as long as they delete the Measurement Systems code. The first few are in fact already back.



ap-wordle-1a

The 9 best Wordle alternatives in 2022

Read Next


About The Author

Steve Huff
(124 Articles Published)

Steve is the Weekend News Editor for Android Police. He was previously the Deputy Digital Editor for Maxim magazine and has written for Inside Hook, Observer, and New York Mag. He’s the author of two official tie-ins books for AMC’s hit “Breaking Bad” prequel, “Better Call Saul.”

More
From Steve Huff

Next Post

Roblox CEO Is Poised For A Massive $200M Payday

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

No Result
View All Result

Recent Posts

  • Decathlon doubles warehouse output with Exotec robots across seven European sites
  • Google Cloud, Openreach expand connectivity collaboration
  • Metacritic's 2025 Rankings Show A Major Shift In Top Publishers
  • ‘Heated Rivalry’ soundtrack is coming to vinyl and CD: Variants, price, release date
  • The handy Kindle Scribe plunges $150 to a record-low price

Recent Comments

    No Result
    View All Result

    Categories

    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi
    • Home
    • Shop
    • Privacy Policy
    • Terms and Conditions

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    No Result
    View All Result
    • Home
    • Blog
    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    Get more stuff like this
    in your inbox

    Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

    Thank you for subscribing.

    Something went wrong.

    We respect your privacy and take protecting it seriously