• Breaking News

    Wednesday, January 15, 2020

    Android Exclusive: Samsung Galaxy S20+ leak confirms 120Hz display, ultrasonic fingerprint scanner, and no headphone jack

    Android Exclusive: Samsung Galaxy S20+ leak confirms 120Hz display, ultrasonic fingerprint scanner, and no headphone jack


    Exclusive: Samsung Galaxy S20+ leak confirms 120Hz display, ultrasonic fingerprint scanner, and no headphone jack

    Posted: 14 Jan 2020 10:48 AM PST

    The Google Play Store will no longer show notifications for updated apps

    Posted: 14 Jan 2020 02:54 PM PST

    Coral is Google’s quiet initiative to enable AI without the cloud

    Posted: 14 Jan 2020 09:19 AM PST

    Google Phone app prepares to add support for call recording

    Posted: 14 Jan 2020 11:40 AM PST

    On the "Spyware" Case: Samsung Proofed to Be LYING, Personal Data were SENT

    Posted: 14 Jan 2020 03:42 AM PST

    This is in response to the Samsung's Qihoo 360 case. For those who don't know, there's a sensational post last week on Reddit, as a user claimed that Samsung partnered with a Chinese company Qihoo and pre-installed irremovable "spyware" on every Samsung phone and tablet. Long story short, I found the post to be jumping to conclusions, but Samsung's response later seemed a little fishy to me. Being a network security researcher, I went ahead and decompiled the APK myself. Though I'd like to believe Samsung, it is however proven that the Device Care app is RECORDING IMEIs and SENDING BACK Uniquely Identifiable IDs back to Qihoo's server. The findings I'm about to spill out can be repeated and is verifiable by anyone. Don't believe my words? Download the APK and decompile it following these steps. You will see the exact same code as me.

    I uploaded the Device Care APK to the JADX Decompiler (http://www.javadecompilers.com/apk) and downloaded the files. Here are decompiled code in the following screenshots:
    https://imgur.com/a/2aVe19m

    Just see the screenshots yourselves. You don't need to be a tech wizard to see that IMEI is being fetched (3rd screenshot and 4th screenshot) and Unique Identifiable ID is being sent to Qihoo's servers (1st screenshot). In the last screenshot, you can even see that the CPU model, whether the user is using WIFI, the free storage space on your phone were also being sent to Qihoo's servers, but I guess that's already nothing compared to your IMEI and Uniquely Identifiable ID. Samsung is obviously deceiving the Android community, hoping we'll just take their word for it.

    Among the decompiled files, there's an entire library (which served as a codebase for apps) that's called libmobilesafe360_clear-jni-6.7.so. I also decompiled that library, using another decompiler (https://onlinedisassembler.com/odaweb/). The library contains the exact same encryption keys (the generation seed: 70>@|:CF0z€.97:M0z|ovyrM) for encrypting HTTP traffic (yup, they would rather encrypt it using their own algorithm than using HTTPS) using the DES algorithm as the ones that was included in 360's contacts backup application. This DES encryption key was proven by Chinese security researchers to be easily cracked and intercepted.

    The final nail to the coffin for me to find out Samsung is lying is that the User-Agent string in the packets that were sent back to the server was straight up called "360clearsdk". How could this possibly be if Samsung was using their own code and was simply "downloading Qihoo's definition database" as they claimed?

    Last but not least, though I guess this evidence is already not needed, this is the permission that the Device Care app has access to on my phone: https://imgur.com/e43NJQx . Notice the "Phone" permission. This is a clear telltale sign for apps to gather IMEI information.

    I took a look back at Samsung's statements. At first, their respond on the Korean forum Naver was this one https://www.reddit.com/r/Android/comments/ektg8u/chinese_spyware_preinstalled_on_all_samsung/fdggokk , which basically says only the filtering database was being downloaded from Qihoo's server. After the original post has gained notoriety and people start demanding the removal of the app, Samsung told The Verge a completely different story: " The storage optimization process, including the scanning and removal of junk files, is fully managed by Samsung's device care solution. " Note how their statement has changed. Samsung now didn't claim that the app was fully made by them, but rather using an ambiguous sentence "...is fully managed by Samsung's device care solution", which basically completely avoided answering the question directly.

    Conclusion:
    Hard facts, which can be verified by anyone interested:
    1. The IMEI is being collected and Uniquely Identifiable ID was being sent to Qihoo's 360 server,
    2. The encryption key that Qihoo was using in its contacts backup app for Chinese domestic users is also used in the Device Care app. Since it uses HTTP, a malicious user can intercept the traffic, decrypt the packets following the guides written by Chinese security researchers, and retrieve your uniquely identifiable ID and IMEI,
    3. In summary of 1. and 2., this basically means that not only are Samsung and Qihoo 360 collecting your personal identifiable information (which possibly violates GDPR and many states' privacy laws in the US), they are also doing it in an extremely insecure way and hackers can eavesdrop these information.

    Speculation:
    1. Since this issue has been brought up time after time before (though none has reached this time's popularity), Samsung quiets down the controversy by lying again and again. They probably bet the users are not technically proficient enough to decompile the code themselves.

    Last but not least, yes, this is a new account, but a throwaway one. I am a network security researcher at a major international InfoSec company, and decompiling code may violate IP laws and perhaps a ton of ToS. I simply want the truth to be out there. I have also sent the above findings to various major media outlets. I just hope that Samsung could stop lying to the r/Android community, and tell us the entire truth. Thanks.

    submitted by /u/vigilante_sec
    [link] [comments]

    XPOST: Firefox lite is now sending ad notifications, like a cheap mobile game

    Posted: 15 Jan 2020 12:37 AM PST

    Link to screenshot

    EDIT: The notification is coming from the "games" section of the browser, which i don't think i have ever used.

    submitted by /u/ExpectedIncome
    [link] [comments]

    No comments:

    Post a Comment