




版權(quán)說(shuō)明:本文檔由用戶(hù)提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
()Q=REPORTSRESEARCHWebelievePDDisaDyingFraudulentCompanyanditsShoppingAppTEMUisCleverlyHiddenSpywarethatPosesanUrgentSecurityThreattoByGRIZZLYRESEARCH(HTTPS://GRIZZLYREPORTS.COM/AUTHOR/GRIZZLY-RESEARCH/)18hoursago·TEMUappsoftwarehasthefullarrayofcharacteristicsofthemostaggressiveformsofmalware/spyware.Theapphashiddenfunctionsthatallowforextensivedataex?ltrationunbeknowntousers,potentiallygivingbadactorsfullaccesstoalmostalldataoncustomers’mobiledevices.Itisevidentthatgreate!ortsweretakentointentionallyhidethemaliciousintentandintrusivenessofthesoftware.。WeengagednumerousindependentdatasecurityexpertstodecompileandanalyzeTEMUapp’scode,integratedwithexpertsofourownsta!,andanalystswhohavewrittenindependentlyinthepublicdomain.Contributingtothedangerofmassdataex?ltrationisthefastuptakerateoftheTEMUapp:over100millionappdownloadsinthelast9months,allinU.S.andEurope.TEMUisnoto!eredinChina.TheTEMUappdevelopmentteamincludes100engineerswhobuiltthePinduoduoapp,whichearnedasuspensionfromtheGooglePlayStore.(Link(/2023/04/02/tech/china-pinduoduo-malware-cybersecurity-analysis-intl-hnk/index.html))Pinduoduoappgotreinstatedbyremovingthe“badparts”,someofwhichwereidenticallyutilizedascomponentsoftheTEMUapp,stronglyindicatingmaliciousintent.·WestronglysuspectthatTEMUisalready,orintendsto,illegallysellstolendatafromWesterncountrycustomerstosustainabusinessmodelthatisotherwisedoomedforfailure.CheapChinashoppingappshavepreviouslyproventhatthebusinessmodelissimplynotsustainablypro?table.WwasaprominentcasestudyandSheinanaggressivecurrentcompetitor.TikTokhasannouncedtheirentryintothespace.TEMUisestimated(Link(/story/temu-is-losing-millions-of-dollars-to-send-you-cheap-socks/))tobelosing$30perorder.Itsadspendingandshippingcosts(1-2weeksfromChina,expeditedtoU.S.delivery)areastronomical.Oneisleftwonderinghowthisbusinesscouldeverbepro?table.TEMUisanotoriouslybadactorinitsindustry.Weseerampantusermanipulation,chain-letter-likea"nityscamstodrivesignups,andoverall,themostaggressiveandquestionabletechniquestomanipulatelargenumbersofpeopletoinstalltheapp.·AU.S.CongressionalcommitteehasalreadydraftedHR1153(/bill/118th-congress/house-bill/1153)whichwouldseriouslyimpairTEMU’sbusinessmodeland/orempowertheU.S.PresidenttobanfromtheU.S.。AllowstheU.S.topunishTEMUforex?ltratingusers’personaldatatoChinawithoutknowledgeorpermission.SlamclosedaloopholeafordingTEMUaccesstoU.S.consumerswithafreepassonpostage,customsinspectionsortarifs.U.S.businessesdon’tenjoysymmetricalrights(/research/shein-temu-and-chinese-e-commerce-data-risks-sourcing-violations-and-trade-loopholes)totheChineseconsumermarket.TEMUisdemonstrablymoredangerousthanTikTok.TheappshouldberemovedfromtheGoogleandAppleappstores.·WebelievePDD’s?nancialsarenotoriouslyunreliable.EventheusuallypromotionalsellsideanalystshavepointedoutthatPDD’saccountingisakintoa“BlackBox”asdisclosurebecomesevermoreopaque.Despitebeingacompanywithamarketcapofappx$135billion,PDDhasnothadaCFOsince2018.Thekey?nancialpositionsarearevolvingdoor.Thereseemstobenoaccountability.ThelocalauditpartnersfromErnst&YoungHuaMingLLPareinourjudgmentuntrustworthyandhaveauditednumerousChinesecompanieswhoseshareshaveprovennexttoworthlessinthepast.。OuranalysisshowsthatPDDmighthaveunderreporteditsemployeecounttoU.S.investorsaccordingtotheirownstatementsinChina.Undercountingemployeesoverstatespro?tabilityinreported?nancials.PDDhasbeenreportedlyinvolvedinmajororderbrushingscandals,andallegationsthat7bnRMBofillicitgamblingtra"cwaslaunderedroutedthroughPDD’splatform.·ImportantoperatingmetricsindicatePDD’sChinabusinessisrapidlydecliningwhileitlosesa?ercebattlewithcompetitorssuchasAlibabaandJD.Alibaba’sregulatoryissuesinChinaseemtohavebeenresolvedinJuly2023.Withouttheburdenofregulatoryintervention,weseethisplayertakingsubstantialsharefromPDD.Atthesametime,JDisincreasingitsefortstotakemarketsharefromPDDandsees?rstindicationsofverypromisingresults.MultipledatasourcesinChina,aswellasGoldmanSachs,havealreadyreportedthatPDD’sdailyaverageusers(DAU)metricisstartingtodeclinemorerapidly.Theyear-over-yeardeclineinDAUforthemonthofJuneisover20%.Thisseemstouslikeafast-deterioratingbusiness.·PDDisabusinessthatisrunforthebene?tofinsidersratherthanshareholders.PDDHoldingsbuiltapaymentsplatformthatituses.However,managementhascarvedouttheentirepaymentsbusinessforitself(theAliPayplaybook).Webelievemanagementhasprivatelyretainedthemostattractivepartofthebusinessforitself.Alargenumberofsharesareunaccountedfor.BillionsofUSDworthofstockreportedlywent“missing”.Somesupposedlywenttocharityandsometoventurecapitalinvestor.Weseethisabsenceoftransparencyasanotherred?ag.Part1:WeBelieveTEMUistheMostDangerousAppinWideCirculationHighlyDangerousSpyware/MalwareCharacteristicsinTEMUappAnalysisofPDD’sappsoftwarebymultipleexpertsisshowingallthesignsofred-?agconcern.Thecallstooutsidedevicedataandfunctionsthatviolateusers’privacyarefarmoreaggressivethananywell-knownconsumershoppingapp.Ourexpertsidenti?edastackofsoftwarefunctionsthatarecompletelyinappropriatetoanddangerousinthistypeofsoftware.TEMUusesthemall.ComparisonofSecurityIssuesappearinginTEMUandcompetitivelandscapeapps.*Green)areamongtheleastdangerous.TheissuesforwhichonlyTEMUis?aggedred(Row1,4,10,15)areamongthemostdangerous—andarethemostlikelytobecombinedtomakeactualspyware.Theseissuesoccurinthepartsofthecodethatareproprietary,obscured,and/orfromacodelibraryrarelyused,poorlyprogrammedbyanichecompany.*ThisanalysiswasperformedAugust30,2023.We?ndtheandroid.permissionentriesreferencedintheproprietarypartsofthedecompiledsourcecode,“Rarelyused”librariesbeingthosethataren’tdirectlyfromthelargetrustworthytechcompaniesmentionedinthisstatement.Itiscommonpracticetoonlyuselibrariesauthoredbythebigtech?rms.Veryselectiveactivationofthemostinvasivefeatures,orTEMU’sabilitytocallthemondemandfromserversinChina,orsideloadevenmoreinvasivebehaviorintoupdatesordynamic(runtime)compilation,isallloomingintheriskpro?leoftheinstalledTEMUapp.CultureofConsumerPrivacyViolationsCollideswithU.S.CongressWheredoesallthatex?ltrateddatawindup?Chinahasimplementedalawrequiring:“Thestateshallprotectindividualsandorganizationsthatsupport,cooperatewith,andcollaborateinnationalintelligencework.”ChinesecompaniescanonlyoperateiftheirentiredatabasesareaccessibletoChinesegovernmentagencies.(Link(/article/technology-business-china-data-privacy-1d3fcbac4549c6968c07897900c96cc3))Inparticular,theChinesemilitaryhasbeencloselytiedforoveradecadetoChinese-basedhackingagainsttheU.S.(Link(/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html))Withtrade,defense,andtechnologytensionsbetweentheU.S.andChinalooming,thereiseveryreasontoanticipatethattheChineseState’swouldhaveinterestinacompany’sabilitytoex?ltrateauser’slocationwithin10feet,plushighlypersonaldatabelongingto“partiesofinterest”:U.S.governmentemployees,membersoftheU.S.military,policeandsecurityo"cers,universityresearchemployees,Chineseexpats,plusmembersofoppressedminoritieswhomighthavefamilymemberswhoareTEMUcustomersinanyWesterncountry.Ofcourse,theChineseStateSecurityapparatushasaninterestintextmessagestoandfromanyU.S.citizenswhocommunicatewiththem.Buyingpatterns,combinedwithgeo-locationandpersonaldata,mightrevealactionableintelligenceaboutanyofus.WhenyouthinkaboutthepossibilitiesofourpoliticalalignmentsbeingassessedandmanipulatedbyaforeigncountryrunningoursmartphonedatathroughitsAIengines,therisksbecomenotonlytangible,butmagni?ed.WebelievemanyU.S.legislatorsalreadythinktheserisksareunacceptablyhigh,withnochanceofafairreciprocalopportunityforU.S.?rmstooperatelikethisinChina.(Thisisnotaliberalvs.conservativegridlockedissue.Legislatorsfrombothsidesoftheaisleareengagedintheseissuesrightnow.)Congressisalreadyinvolved.Theyjustneedto?gureoutthatTikTokisn’ttheworstthreatweface:TEMUis!HR1153(/bill/118th-congress/house-bill/1153)isalreadybeforeCongress,butmosteveryonethinksit’saboutbanningTikTok!Readon!directiveprohibitingU.S.personsfromengaginginanytransactionwithanypersonwhoknowinglyprovidesormaytransfersensitivepersonaldatasubjecttoU.S.jurisdictiontoanyforeignpersonsubjecttoChinesein?uence.Thebillalsoestablishesnewsanctionsoncertaintransactionsrelatedtoconnectedsoftwareapplications.Forexample,thePresidentmustimposeasanctiononanyforeignpersonthatknowinglyoperates,directs,ordealsinaconnectedsoftwareapplicationthatissubjecttothejurisdictionofChinaandisreasonablybelievedtohavebeenormaybeusedtofacilitateorcontributetoChina’smilitary,intelligence,censorship,surveillance,cyber,orinformationcampaigns.It’swidelyassumedbysecurityexpertsandpoliticiansthatanyuserdataacquiredbyaChinesecompanywindsupindatabasesaccessibletoChineseSecurityServices.Butwe’reabouttoshowyouwhyTEMU’sappsaremuchmoredangerousthananythingTikTokmightbedoing.AHeritageofMalware:TEMU‘sAppismaliciousspywarewhosecodebaseissharedwithPinduoduo’spreviouslysuspendedappThereisstrongevidencethatelementsofPinduoduo’srecentlysuspended(andsubsequentlyreinstated)?agshipappareinplaceinPinduoduo’smalwarewasnotafringeorcircumstantiale!ort.PDDrecruitedandhiredateamof100programmersto?ndandexploitOEMcustomizationsofAndroid(installedonmainstreambrandsoflow-pricedsmartphones),intendingtoexploitvulnerabilitiesauditedlessoftenthanthemainlineAndroidcodebase(estimatesofover50suchvulnerabilitiesweretargeted).AsreportedbyCNN,(Link(/2023/04/02/tech/china-pinduoduo-malware-cybersecurity-analysis-intl-hnk/index.html))oneofPDD’sstrategieswastorunthissoftwareonlyinsmalltownsandotherrural,lessdevelopedareasofChina,avoidingBeijingandShanghai,toevadedetectionduringdevelopment.“Wehaven’tseenamainstreamapplikethistryingtoescalatetheirprivilegestogainaccesstothingsthey’renotsupposedtogainaccessto.It’sprettyunusual,anditisprettydamningforPinduoduo”–MikkoHypp?nen,cybersecurityexpert.“I’veneverseenanythinglikethisbefore.It’ssuper-expansive.”—SergeyToshin,AndroidSecurityExpert,founderofOversecuredOnMarch21,2023,Googleannounced(https://insideretail.asia/2023/03/24/google-suspends-chinas-pinduoduo-app-on-security-concerns/)suspensionoftheGooglePlayStoreversionofPDD’sPinduoduoappduetosecurityconcerns,aftermalwareissueswerefoundonversionsoutsideofGoogle’sownPlayStore.(AlthoughmalwareiscommonenoughonAppStores,installing“sideloaded”appsisalwaysanevenriskierpractice.)AfterGoogle’sPlayStoresuspendedPinduoduo,parentPDDmadeabigshowofissuingaPinduoduoupdate,purportedlyremovingthemalware(seeourtechdiscussionofthissuddenchange,andwhatwelearnedfromit,below).Pinduoduodisbandedand“?red”theteamresponsibleforthemalware.Butthatwasforshow.Ofcourse,theywereimmediatelyallhiredbyPDD’sothercompany,TEMU,and“reassigned”.(SameLink(/2023/04/02/tech/china-pinduoduo-malware-cybersecurity-analysis-intl-hnk/index.html),sameCNNstoryaslinkedabove.)AppSoftwareAnalysisandExpertQuotesLikeanyprobesearchingformalware/spyware,ouranalysisbeginswithasearchforaggressive,potentiallyinvasivesystemcallsthatwouldbecomponentsofexecutingcodethathavethepowertoex?ltrateinappropriateuserinformationthatviolatesappstorepolicies,andinvadesuser’sprivacy.Speci?cattentionisdrawntosoftwareexecutionwhoseintentistohideorobfuscatemalignactionsfromanalystsand/orautomatedsecurityscans.Thissectionistechnicalbecausemalware/spywarecreationanddetectionisacat-and-mousegameconductedbysoftwareengineers.ThesearesomeofthesecurityissuesfoundinTEMU’sapp:1)Dynamiccompilationusingruntime.exec().Acrypticallynamedfunctioninthesourcecodecallsfor“packagecompile”,usingruntime.exec().Thismeansanewprogramiscreatedbytheappitself.—Compilingistheprocessofcreatingacomputerexecutablefromahuman-readablecode.Theexecutablecreatedbythisfunctionisnotvisibletosecurityscansbeforeorduringinstallationoftheapp,orevenwithelaboratepenetrationtesting.Therefore,TEMU’sappcouldhavepassedallthetestsforapprovalintoGoogle’sPlayStore,despitehavinganopendoorbuiltinforanunboundeduseofexploitativemethods.ThelocalcompilationevenallowsthesoftwaretomakeuseofotherdataonthedevicethatitselfcouldhavebeencreateddynamicallyandwithinformationfromTEMU’sservers.“That’sbad.That’sreallybad,becauseiftheyarelocallycompilingpackages,thentheycanliterallydoanythingtheywantatanytime.Itmeansthatyoucan’tanalyzebecausethesystemistrulydynamic.”Thisfeaturealoneisa“wildcard”thatloomsovermostspeci?crisksofmalware.It’slikedebatingwhohasthemostkeystobreakintoabuilding,whenyouholdthemasterkeyinyourhand.Putanotherway,ifalltherestoftheobjectionablecodewasremoved,whilethisonebackdoorwentundetectedduetoitsconcealment,theappcouldbecomejustasmalignant,bychangingitsbehavior,controlledbyforeignservers,inalmostallpossiblewaysandreactivetoallfuturedevelopmentsoftheapp,theregulationsandallotherpossiblein?uences.Forexample,TEMUcanpotentiallysendsourcecode,encryptedandmasqueradingasanyunsuspiciouspieceofdata,whichisthencompiledintoanexecutableontheclient’sphone.executingdynamiccompilingusingruntime.exec().2)We?ndtheandroid.permissionentriesreferencedintheproprietarypartsofthedecompiledsourcecode,excludingoccurrencesinwidelyusedandsecurestandardlibrariesbyAndroid,Google,Facebook,PayPalandKlarna.Whywouldtheproprietarysourcecodereferencethesepermissions,ifitdoesn’thavetheoptiontousetheminspeci?cscenarios?Mostimportantly,manyofthesepermissionsinTEMU’ssourcecodearenotlistedintheirAndroidManifest?le,whichisthestandardizedoverviewsourceforanapp.Forscrutinizingpermission,theAndroidManifest?leisthe?rstsourcetocheckpermissions.NotmentionedintheAndroidmanifestarethepermissioncoincidencethatthesepermissionsarethemostintrusiveoneswhenitcomestospyingpotential.Forcomparison,alltheotherappslistedinthecohorttableenumerateallofthesepermissionsintheirAndroidManifest,iftheyusethematall.Theonlyexceptionis3)TEMUqueriesinformationrelatedto?les,andnotjustitsown?les,butwantsinformationonall?lesontheuser’sdevicebyreferencing“EXTERNAL_STORAGE”,superuserrightsandlog?les.Inotherwords,dependingonthespeci?cAndroidversion,theappcanbeusedtoread,processandmodifyalluserandsystemdata:chatlogs,images,usercontentonotherappsandsoon.3a)Theappincludes?leuploadfunctionalitythatisbasedonacommandserverconnectedtotheirAPI‘’.Thismeansthatonceausergrants?lestoragepermissiontotheTEMUapp–evenunwittingly–TEMUwillbeabletoremotelycollectanyandall?lesfromtheuser’sdeviceandsendthemtotheirownservers.Dittoforanyotherprivacy-intrudingpermission.NOTE:Manyifnotallusersaretypicallyfatiguedandimpatientwhenfacedbyappinstallationdialogboxes,whentheydonotunderstandtheconsequences.TEMU,likeothermajorshoppingappsincludingAmazon,Ebayandmanyothers,apparentlygainsaccesstotheuser’s?lesystemandtheirgeographiclocationatonetimeoranother,duringinstallationoroperation.Weestimatethatfewerthan10%ofuserswillbeawareenoughtorefusetograntthesepermissionstoanappthathasitsprogrammingteamandmainserversinChina.Butformostusers,it’sjustacheckbox,andonceit’sdone,it’sforgotten.It’slikegoingonalongvacationandleavingthesafeinyourhomeunlockedandopen.Moreonthislater.3b)Slippinginpermissionsrequestswithbigconsequences.Here’showthisworks.TheTEMUappdoesn’taskaggressivelyforalotofpermissionswhenyou?rstinstallit.But,forexample,onceyoulearnyoucanpostapictureandTEMUcansearchitslistingsforasimilaritemono!er,youmightwanttotrythatengagingfeature.Searchforanitemlikeaphoto,andTEMUasksforlocationpermission.Soyouuploadaphotoofashirt.TEMUthrowsyouanordinaryAndroidscreenthatrequestspermissionforPreciseorApproximatelocation.(Noticehowitdefaultsto“Precise”.)Becauseofthecontext—rememberyouwerejusttryingtouploadaphotofromyourcamera—youassumeyou’rebeingaskedforpermissiontopostyourlocationtothephotosyoutakewhileintheTEMUapp.Soyouclick‘Whileusingtheapp’andgoonaboutyourmerryway.Nowyoucanlookforametallicbluecomputermousefor$3.00orabeachshirtlikethecoolphotoonyourscreenforunder$4.00.Great!Howwouldyouknowthatyou’vejustgrantedTEMUaccesstoyourlocationwithin10feetwheneveryouuseTEMU’sapp?(Notjustwhenyoutakeaphoto?)WhydidTEMUevenaskforthatpermissionatthatpoint?Goodquestion!Yousee,thereisnospeci?cpermissiontogrant“Precise”locationtoyourcamera.Inthiscase,youhavejustgranted“Precise”locationpermission(FINE_PERMISSION)toyourphone,wheneveryouareusingtheTEMUapp.Youwouldn’tsuspectthattheTEMUappcontainsafullstackofmalware/spywaretoolstodojustaboutanythingitwantswithyourphoneandgetnearlyanythingstoredonitsenttoitsownserversinthebackground.AnditmasksitsintentionsbecausesoftwarethatviolatesyourprivacyisgenerallynotpermittedtobepostedfordistributioninGoogle’sPlayStoreorApple’sAppStore.GrantTEMUaninnocuouslookingpermissionsrequest,andyou’vejustgivenawaytheelectronicversionofyourhousekeys,yourcarkeys,andthecombinationtoyoursafe,yourkeystoyour?ledrawers,yourphotostorage,etc.,etc.,…allofit.4)Location,location,location.AndroidimplementedthesystemfunctionACCESS_COARSE_LOCATIONspeci?callysoappscouldacquiresomereasonableleveloflocationdatawithoutcompromisingusers’privacy.ButdoesTEMUusethat?Noooo!Asyouseefromourappcomparisontableabove,TEMUgetsitshandsonACCESS_FINE_LOCATION,to?ndoutwhereyouarewithin10feetorso,aquerysointrusivethattheAndroidteamitselfdoeseverythingitcantodiscouragetheuseofACCESS_FINE_LOCATIONexceptwhenabsolutelyneededforcoreappfunctionality(suchasamapapp).(Link(/training/location/permissions))CanTEMUascertainyourexactlocationrightnow,youask?Fromwhatwesee,onlywhentheTEMUappisrunning.Beyondthat,unfortunately,oursecurityexpertscan’ttellyou.Itdepends…onwhatversionofAndroidyouarerunning,onthepermissionsyou’vegrantedtotheTEMUapp,andwhetheryou’reconnectedtooneormorecelltowersrightnow.intrusivebydevelopersunlessspeci?callyneededforcorefunctionality.Wehopethisexamplehelpsclarifythepersonalurgencywefeelaswesharethesediscoveries.5)“Root”access.TEMUchecksifadevicehas“root”access.Withrootaccess,theuserandtheTEMUappareabletoread,modifyandwritenotonlyuser?les,butall?lesonthedevice,includingalltheprogrammingofotherappsandtheoperatingsystem.TEMUcouldtheoreticallybrickanydevicewheretheuserhas“root”accessandTEMUhas?lewritingpermissions.Maximumdanger!6)Encryption,decryptionandshiftingintegersignalslibrariesareinpriorversionsofPinduoduoandTEMUapps.Theonlypurposeofthisisobscurationofmaliciousintent.PDDveryquicklyremovedthiscomponentinbothappswhencaughtbyGoogleinPinduoduo.Before/afteranalysisofthissuddenchangetoPinduoduo’sandTEMU’scodebaserevealsadditionalconclusions.Seesection‘AnalysisofPDD’s“Cleanup”actions’fordetails.“Well,it’sobfuscation,andcertainlymaliciouscodewantstobeobfuscated.Iamnotafanofthisstu!forthereasonsyoustate,buttherearepeoplewhowanttoprotecttheirtradesecretswithobfuscatedcode.I’mnotafan.Combinedwithsomethingabove(loadable,compiledcode)alongwithobfuscation,Ithinkit’saworry.”7)AndroidversionandOEMexploits:TEMU’ssoftwareteamincludesengineerswhowrotePinduoduo’sapp,whichcontainedexploitsforover50Androidsecurityweaknesses,(Link(/2023/04/02/tech/china-pinduoduo-malware-cybersecurity-analysis-intl-hnk/index.html))includingmanywrittenforOEMcustomizationcode,whichissubjecttolesssecuritythanthemainAndroidcodebase.InformationabouttheAndroidversionisqueriedbysystemcalls.8)Debuggerinthehouse.CallsinthecodeincludeaqueryDebug.isDebuggerConnected(),indicatingtotherunningappifadebuggerisengaged.Webelievethisisintendedtoobstructorobscureanalysisoftheapp,andmostlikelytochangeappbehaviorifananalystisinspectingitdynamically.“HUGEred?agtome.Morethananythingelse.Detectingadebuggermeans—well,youdon’twantanyoneelsetoknowwhatcodeyou’rerunning.”9)User’sSystemLogsTEMUappisreferencingsystemsdataoutsidetheboundsofTEMU’sownapp.TEMUseeminglyreadstheuser’ssystemlogs.ThisgivesTEMUtheabilitytotrackuseractionswithotherappsrunningontheuser’sdevice.Forthelesstechnicalreadingthis,thesystemlog?lesprovideexhaustivedetailsonalltheprocessesonthedevice,includingerrors,networkwarningsetc.It’sthedevice’ssecretdiary,withallitsmisstepsandmishapsdetailed.TEMU’scodereferencesthelog?les’addressandoptionsforshellcommands.Theonlyreasontointroducesuchstringsintotheproprietarycodeistogatherthelogdatatoobservetheuser’sactiveusageoftheirdevice.Inaccordancewiththis,TEMU’sapprequestsalistofrunningprocessesusinggetRunningAppProcesses(),whichtogetherwiththelog?lesseemstomaketheappinvestigatetheoveralldevices’activitiesquitethoroughly.TEMUapp’scodecorrespondireferencingtothesystemlog.10)LicenseandRegistration,please.TEMUasksfortheMACaddress,andotherdeviceinformation,andinsertsitintoaJSONobjecttobesenttotheserver.Thisisespeciallyaggressive.Whydoesashoppingappneedadatabaseoftechnicaldetailsoftheircustomers’devices?TheMACaddressisagloballyuniqueidenti?erofanydeviceinanynetwork.Thismeans,inthecommunicationwiththeserver,TEMUcanpotentiallysendinformationandsourcecodetoaspeci?cuseronaspeci?cdevice.referencingthedevice-speci?cMACaddresssTheTEMUappevenreadsandstorestheMACaddress,whichisauniqueandglobalhardcodednetworkidenti?erofadevice.ThisisabigNoNoininternetsecurity.ADistributedDenialofService(DDOS)attackandotherunwantedsecurityprobescouldconceivablybelaunchedagainstadisclosedMACaddress.11)Lookingoveryourshoulderwhileyouuseyoursmartphone.TEMUcallsgetWindow().getDecorView().getRootView(),tomakescreenshotsanditstoresthoseresultsina?le.Screenshotshavebeenusedbeforeasaconvenientwaytospyoncustomers’activities.WhatbusinessofTEMU’sisitwhatotherprogramsanddataareonyourcomputerscreen?“Wellknownabusivething.It’showabusiveappsknowthatyouhavesomeotherappinstalled.Itcanalsobeusedforhackingcredentialsandsoon.…Thisisadanger.Anotherbigred?ag.”12)TheRiggedSpinner:WhenyouclickonaTEMUdisplayadoraGoogle“ProductShowcase”(horizontalscrolling)addisplayedbyGoogleinresponsetoaspeci?csearchterm,yourclickgoestoTEMU,asdoesotherdata,includingwhatproductyouclickedon(manyTEMUadsshowmultipleproducts–seebelow—andwhoknowswhatelse).Theriggedspinneralwaysperformsthesamelittlescript.Italwaysstopson“OneMoreChance”,thenevenifyoutriedtobrowseaway,itstopsonthebrightorangewedgewiththebiggestdiscount…everytime.Ifyou losepatiencewiththislittlecharade,youcan’tclick“X”toexit.Youarecaptive—youhavetoclosethebrowserwindowtogetaway.13)Shieldsdown,LieutenantUhura.Whywouldaserviceproviderintentionallyandarbitrarilylowerencryptionstandards?Onceauserhasgranted?lestoragepermissiontoTEMU,evenbyaccidentorbyvirtueofnotknowingwhatthatisorwhyitmightbeinvitingproblems,(Seepoints3)and3aabove)TEMUwillbeabletoreadandtransmitanyandall?lesontheuser’ssystem,withlittleornoencryption.14)Lights,camera,action!TEMU’sappreferencesaccesstotheusers’cameraandmicrophone,whenevertheappisrunning.Whydoesashoppingappneedaccesstoyourcameraandmicrophone?Theappusesthecameraoccasionally,forexampleforuploadeduserpicturesinthereviewandimagesearchpartsoftheapp.However,duringourtesting,wedidnot?ndanyapplicationfortheRECORD_AUDIOaccess.Recordingaudiowouldobviouslybeaveryexploitablefunctionforpossiblespypurposes.15)ComplexdynamicDNSnaming:WheneveraTEMUusersignsintoaWiFinetwork,theapptriggersaninternetrequesttothestaticIPandreceivesanencryptedstringback.InTEMU’ssourcecodeafunctionDnsCon?gInfo()referencesthisIP,indicatingthattheinternetrequestisrelatedtodynamicnamingofwebaddressesbyTEMU.Thefunction’snamecanalsobeamisleadingmasquerade,ofcourse.OuranalystsquestionedwhythisexchangeisencryptedandwhyTEMUwouldusealayerofapparentlycomplexdynamicnamingdespiteowningstaticIPad
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 中國(guó)膽道引流管行業(yè)市場(chǎng)前景預(yù)測(cè)及投資價(jià)值評(píng)估分析報(bào)告
- 2025年中國(guó)毛球修剪器市場(chǎng)調(diào)查研究及行業(yè)投資潛力預(yù)測(cè)報(bào)告
- 2025年光纖預(yù)制棒項(xiàng)目評(píng)估報(bào)告
- 2025-2030年中國(guó)農(nóng)機(jī)配件鑄件行業(yè)深度研究分析報(bào)告
- 2025年共享辦公市場(chǎng)分析報(bào)告
- 城市道路可研報(bào)告
- 針織品文化衫行業(yè)深度研究分析報(bào)告(2024-2030版)
- 蕭山區(qū)物業(yè)保潔管理辦法
- 藁城區(qū)傳統(tǒng)倉(cāng)儲(chǔ)管理辦法
- 融媒體中心媒資管理辦法
- 公路建設(shè)項(xiàng)目可行性研究報(bào)告編制辦法講解課件
- 房地產(chǎn)開(kāi)發(fā)全流程培訓(xùn)講義課件
- DB44-T 2163-2019山地自行車(chē)賽場(chǎng)服務(wù) 基本要求-(高清現(xiàn)行)
- 上海市建設(shè)工程竣工驗(yàn)收?qǐng)?bào)告
- 云南省特種設(shè)備檢驗(yàn)檢測(cè)收費(fèi)標(biāo)準(zhǔn)
- DB15T 933-2015 內(nèi)蒙古地區(qū)極端高溫、低溫和降雨標(biāo)準(zhǔn)
- 有鍵螺旋槳及尾軸安裝質(zhì)量要求標(biāo)準(zhǔn)
- 工傷責(zé)任保險(xiǎn)單
- 固體廢物采樣培訓(xùn)
- 新概念英語(yǔ)第二冊(cè)單詞打印版
- 小學(xué)語(yǔ)文一到六年級(jí)生字表
評(píng)論
0/150
提交評(píng)論