{"id":20117,"date":"2018-04-17T17:15:04","date_gmt":"2018-04-17T21:15:04","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=20117"},"modified":"2019-11-15T22:35:21","modified_gmt":"2019-11-15T11:35:21","slug":"leaking-ads","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/leaking-ads\/20117\/","title":{"rendered":"Leaking ads"},"content":{"rendered":"<p>We have <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/android-app-security\/18505\/\" rel=\"noopener noreferrer nofollow\">repeatedly warned<\/a> our readers about the <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/browser-extensions-security\/20886\/\" rel=\"noopener noreferrer nofollow\">dangers<\/a> posed by programs of unknown origin. But most people seem to have no qualms about trusting apps from reliable developers and reliable sources: Positive ratings, millions of downloads, and distribution through official stores like Google Play are seen as a badge of security. However, there are no guarantees.<\/p>\n<p>This article is not about Trojans, but about bona fide apps that can nevertheless leak your data online. Our experts <a target=\"_blank\" href=\"https:\/\/securelist.com\/leaking-ads\/85239\/\" rel=\"noopener noreferrer\">studied a total of 13 million APKs<\/a> (Android application packages) and found that roughly a quarter of them transmit unencrypted data over the Internet. Some of these apps boasted hundreds of millions of downloads, sometimes more than half a billion! This isn\u2019t a small problem.<\/p>\n<p>Information sometimes leaks online because of a developer mistake, but that\u2019s not how it happens in most cases. If called upon to send user data to a server, most apps use the secure HTTPS protocol, which prevents outsiders from intercepting the data. The problem lies in the third-party services that developers plug in without background checks. For example, some analytics or advertising services transmit information over the Internet, but using the standard HTTP protocol, which is not secure.<\/p>\n<p><strong><\/strong><\/p>\n<h2>What information might be affected?<\/h2>\n<p><\/p>\n<p>Most of the data leakage we detected had to do with the device model, its technical specification, network or ISP-related data, and the APK name (by which the system recognizes the package); many services also leaked the smartphone or tablet coordinates.<\/p>\n<p>In some cases, information about app usage was transmitted over HTTP by an embedded third-party service. This information included likes, posts, pages visited, and so forth, as well as details about the owner of the gadget \u2014 name, phone number, date of birth. Unique keys created for each authorization request were also often found to be transferred insecurely. Fortunately, most services do not transmit logins and passwords in unencrypted form, although some did.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>One in four mobile apps transmits a portion of your personal data over an unprotected channel<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F9uji&amp;text=One+in+four+mobile+apps+transmits+a+portion+of+your+personal+data+over+an+unprotected+channel\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong><\/strong><\/p>\n<h3>What\u2019s dangerous about that?<\/h3>\n<p><\/p>\n<p>Information transmitted over HTTP is sent as plain text, allowing almost anyone to read it \u2014 including your ISP, for example. What\u2019s more, the path from the app to the third-party server is likely to have several \u201ctransit points\u201d in the form of devices that receive and store information for a certain period of time.<\/p>\n<p>Any network equipment, including your home router, may be vulnerable. If hacked, it will give the attackers access to your information. (The ISP, meanwhile, can view that without having to hack anything.) And obtaining some information about the gadget (specifically IMEI and IMSI numbers) is enough to monitor your further actions. The more complete the information, the more of an open book you are to outsiders \u2014 from advertisers to fake friends offering malicious files for download.<\/p>\n<p>However, leaks of device and user data are only part of the problem; unencrypted information can also be substituted. For example, in response to an HTTP request from an app, the server might return a video ad, which cybercriminals can intercept and replace with a less innocuous version. Or they might simply change the link inside an ad \u2014 and instead of a cute game or deal aggregator, the user risks downloading something far more nefarious.<\/p>\n<p><strong><\/strong><\/p>\n<h2>What can you do?<\/h2>\n<p><\/p>\n<p>These issues should really be tackled by app developers. But they can\u2019t be completely trusted to handle the task, so we\u2019ve got a few simple tips to keep you and your data better protected.<\/p>\n<ul>\n<li>Check the permissions an app requests \u2014 it may take time, but it\u2019s never a waste of time, even if the app has millions of downloads to its name. If, say, a messaging app wants to know your location, don\u2019t be bullied into revealing it. See <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/android-permissions-guide\/14014\/\" rel=\"noopener noreferrer nofollow\">here<\/a> for more details about Android permissions.<\/li>\n<li>Buy paid versions of apps, money permitting. They don\u2019t show ads, which means less risk of data leakage. However, they can still make use of third-party analytical modules, which often behave no better.<\/li>\n<li>Use a VPN \u2014 this secure connection will protect your data even if the developers can\u2019t. For example, <a href=\"https:\/\/www.kaspersky.com.au\/vpn-secure-connection?icid=au_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____vpn___\" target=\"_blank\" rel=\"noopener\">Kaspersky VPN Secure Connection<\/a> is just the ticket.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksec\">\n","protected":false},"excerpt":{"rendered":"<p>Even very popular apps display ads using third-party code, which can transmit personal data unencrypted.<\/p>\n","protected":false},"author":2484,"featured_media":20118,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2646],"tags":[2859,2860,1510,352,961,181,43,97,422],"class_list":{"0":"post-20117","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-klrsac18","9":"tag-rsac2018","10":"tag-advertising","11":"tag-kaspersky-lab","12":"tag-leaks","13":"tag-mobile-apps","14":"tag-privacy","15":"tag-security-2","16":"tag-threats"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/leaking-ads\/20117\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/leaking-ads\/13137\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/leaking-ads\/10958\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/leaking-ads\/15232\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/leaking-ads\/13506\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/leaking-ads\/15885\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/leaking-ads\/15437\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/leaking-ads\/20199\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/leaking-ads\/4848\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/leaking-ads\/22074\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/leaking-ads\/10272\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/leaking-ads\/9161\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/leaking-ads\/16459\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/leaking-ads\/20173\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/leaking-ads\/20115\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/rsac2018\/","name":"#RSAC2018"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/20117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=20117"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/20117\/revisions"}],"predecessor-version":[{"id":24089,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/20117\/revisions\/24089"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/20118"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=20117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=20117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=20117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}