Android apps secretly steal users' data by colluding with each other, finds research

The biggest security risks can come from some of the least capable apps

Aatif Sulleyman
Monday 03 April 2017 11:07 BST
Comments
The team reports that the types of app fall into two major categories
The team reports that the types of app fall into two major categories (Justin Sullivan/Getty Images)

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

Android apps are mining smartphone users’ data by secretly colluding with each other, according to a new study.

Virginia Tech researchers have found that pairs of apps can trade information, a capability that can lead to serious consequences in terms of security.

The team analysed 110,150 apps – including 100,206 of Google Play¹s most popular apps – over three years, using a custom-built software tool called DIALDroid.

“Researchers were aware that apps may talk to one another in some way, shape, or form,” said Gang Wang, an assistant professor at Virginia Tech’s department of computer science and one of the co-authors of the research.

“What this study shows undeniably with real-world evidence over and over again is that app behavior, whether it is intentional or not, can pose a security breach depending on the kinds of apps you have on your phone.”

The team reports that the types of app fall into two major categories: malware apps specifically designed to launch a cyberattack; and apps that simply allow for collusion and privilege escalation.

It added that the biggest security risks came from some of the least capable apps.

Users should therefore take more care to read through permissions before downloading an application they might not necessarily need.

Something seemingly innocuous, like a torch app, could for instance leak a user’s geolocation data or contacts.

However, the researchers stressed that it isn’t possible to quantify the intentions of the developers of apps that fall into the latter category, so many of them could be colluding entirely unintentionally.

“Of the apps we studied, we found thousands of pairs of apps that could potentially leak sensitive phone or personal information and allow unauthorized apps to gain access to privileged data,” said fellow co-author Professor Daphne Yao.

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in