SHA-1 SSL certificates which are more popular and an sucessor of MD5 algorithm are now in the final days of what was once one of the most widespread types of SSL certificates:SHA-1.
Now, due to the ever present requirement to strengthen processes and techniques against a background of constantly improving computational power, it is the turn of SHA-1 to be replaced with its successor – SHA-2.
For those cheering the demise of this much-maligned algorithm, the news is good as the end is quite near:
Mozilla Firefox: From Firefox version 51, the browser will show an “untrusted connection” error warning for any site still using SHA-1.
Microsoft Internet Explorer and Edge: Starting on February 14, websites still using SHA-1 will get a rather unpleasant Valentines Day gift: the browsers will not load their websites whatsoever, though users can still opt to continue to the website after seeing a warning message.
Google Chrome: At the end of January next year, with the release of version 56, Chrome will stop trusting any SHA-1 SSL certificate and will provide a security warning.
Apple Safari: We do not have exact dates on when Apple will officially stop trusting SHA-1 certificates. The latest release notes for MacOS urge sites to drop SHA-1 as soon as possible, and websites loaded in the Sierra version already do not show the green padlock that indicates a trusted site.
What older clients don’t support SHA256
Many older clients don’t support SHA256, but the real question is which of those are relevant? The answer will vary depending on the site. For detailed information on client capabilities, head to Comodo, which maintains a detailed summary of SHA256 support for a large number of platforms.
Code-signing certificates
To be trusted by Microsoft applications/platforms, then all SHA1 code signing certificates should be replaced before 1 January 2016.
We are not aware of information relating to when SHA1 personal certificates will become obsolete; but they will be in due course. It is recommended to replace these as soon as possible or before 1 January 2016 (as with code-signing certificates).
Twitter co-founder and CEO Jack Dorsey found his account on the micro-blogging site briefly suspended Tuesday. For about 30 minutes, starting 8:45 p.m. EST, his account status showed as “suspended.”
Dorsey’s account was restored about half hour later, and at 9:15 p.m. EST, he had around 200 followers. Eventually, all his 3.8 million followers on the social network were restored.
Dorsey later tweeted the suspension was an “internal mistake.” He even joked by posting his first tweet — “just setting up my twttr.”
The service has been slow to suspend people for hate speech and harassment in the past, but is usually quick to remove accounts that post obscene images or videos. Speculating entirely, it could be that Dorsey was the target of a hacking attempt, and his account was taken down to preemptively halt any kind of public performance, while Twitter worked to get it back into his hands.
Twitter generally suspends hacked accounts or those which have been flagged for sending abusive or spam tweets. The social network has been actively suspending accounts recently, including many accounts last week related to the white nationalist “alt-right” movement. The heads of various companies have suffered from hacking in the past. In August this year, Wikipedia co-founder Jimmy Wales’ Twitter account was hacked, while in April 2015, Tesla CEO Elon Musk’s account was hacked.
The company also issued new developer policies Tuesday prohibiting surveillance using the social network.
“We prohibit developers using the Public APIs and Gnip data products from allowing law enforcement — or any other entity — to use Twitter data for surveillance purposes. Period.” Chris Moody, general manager, Data & Enterprise Solutions, posted on the Twitter blog Tuesday.
He further added: “If developers violate our policies, we will take appropriate action, which can include suspension and termination of access to Twitter’s Public APIs and data products.”
A proof of concept from security researcher and software developer Samy Kamkar shows that macOS, Windows, and Linux computers can have any previously active Web logins hijacked merely by plugging in a tiny Unix device via USB or Thunderbolt, even if the computer is locked and password protected, and possibly even when it seems to be asleep. It can also hijack many router brands on the same network.
PoisonTap exploits several interlocked network and browser design features, rather than relying on an operating system, hardware, or browser flaw. This will make it harder to root out and resolve.
Kamkar said in an interview, “The interesting attacks to me are by design: how do you exploit the protocol rather than a single buffer overflow that gets patched the next day.”
Kamkar debated how to release news of this flaw, but it’s such a long-standing problem in plain view, that he believes it’s likely been found quietly before.
There was no one company or product affected, but effectively all of them. “This is a continuous problem we’ve had for years and years and years,” he said. “I just had to release it.”
The good news, however? Someone needs physical access to your machine, although only for 30 to 60 seconds. And quitting your browser before walking away from your computer mitigates the attack entirely.
Operating system makers and router makers will be able to release broader mitigations too, if they decide they care about it.
Background injections
When you attach a device that offers a network interface, like a USB-to-ethernet adapter, all major modern desktop operating systems discover it when it’s plugged in, and immediately add it to your list of network connections.
This also works over Thunderbolt on a Mac and some other systems with Thunderbolt support. (You can install third-party software on some platforms that blocks new networks, but this attack might bypass those because of how it works.)
The PoisonTap proof of concept relies on the Raspberry Pi Zero platform, a tiny $5 computer that runs Linux and has various interfaces. When a PoisonTap device is plugged in via USB or Thunderbolt, it boots in about 30 to 60 seconds and identifies itself as a network adapter.
With a normal network adapter connected to a normal network that uses automatic assignment (via DHCP), the operating system tries to assign an address by asking for one over the adapter. A networked DHCP server hears the request and responds with an offer of an IP (Internet Protocol) address on the local area network (LAN), the LAN’s address range for other local devices, and the address of the gateway or router.
A computer doesn’t have to be awake and unlocked. USB and Thunderbolt network adapter recognition happens automatically whenever the OS is active. Even if the OS is seemingly asleep, it may accept and manage USB and Thunderbolt connections in its low-function level.
PoisonTap acts as both adapter and fake network, and responds with a network range that encompasses all Internet address. On a Mac, automatically added networks are dropped to the bottom of the list in the Network pane of System Preferences, which gives them a lower priority, meaning they should be ignored for most purposes unless the higher-ranked network connections (like Wi-Fi or ethernet) are unavailable.
But by assigning the entire Internet as the network range, Kamkar bypasses this restriction, and can respond effectively to any request.
The PoisonTap device now waits for any unencrypted Web connection. If you have any tab open in a browser, even on what seems to be an encrypted (https) page, your browser is probably sending out background requests to ad networks to refresh ads, to beacons that monitor your time on a page, and to any number of other status updates and page-element refreshes. “Everyone I know and work with and myself—I have 20 to 30 tabs open and a couple of windows,” Kamkar said.
As soon as one of those requests is made, PoisonTap leaps into action. It hijacks the request and replies with a page that loads the top million sites ranked by Alexa—yes, a million—background connections that are invisible when viewing the Web browser. Kamkar says he uses a technique that causes a page to be retrieved without rendering it in the browser, even invisibly, which allows what should be a crippling set of operations to happen.
The goal is to grab Web session tokens stored as browser cookies and then ship them back to the attacker through a connection that’s also created in the browser.
Opening a session from a browser that has previously logged in causes the browser to issue a request that contains a stored cookie, which often allows a session to continue without re-entering a user name and password. The PoisonTap device intercepts those connections and grabs the cookie as well as any other information.
While those cookies should be sent over https connections, which are increasingly used by default or preferentially by major sites of all kinds, Kamkar said several weakness let PoisonTap work around this.
Not all servers mark cookies as “secure only,” which allows PoisonTap to send an http (unencrypted) request and have the browser send a cookie that it previously only relayed securely.
And only some servers use a configuration technique that forces a capable browser to always use https. If that’s not in place, and it’s not yet heavily used, PoisonTap can create the plain http connection.
The attack takes just seconds after the PoisonTap hardware boots, at which point the actual device can be unplugged. All the pages remain silent, cached indefinitely, and active as secret backdoors.
Once in place in a browser, PoisonTap code can access secure local corporate networks through browser requests, and send data off through its remote connection.
If that’s not enough, PoisonTap also runs software that lets it test for routers on the local network, and then use a default administrative password to access and reconfigure them.
This works even if a router can’t be reached remotely over the Internet, as long as the password hasn’t been changed, or if the current browser has connected and stored the router’s password.
“If you can get into the router, you can change DNS for everyone on the network,” Kamkar said. By changing the DNS server values on a local router to a malicious remote location, PoisonTap can hijack the entire network’s unencrypted traffic, or potentially install malicious router firmware that’s far worse, turning it into part of the growing Internet of Things botnet problem.
Mitigating a gaping hole
This may sound pretty hideous and, yes, indeed, it is. But because of the physical proximity requirement, you may not be vulnerable unless your computer is ever unattended in a place that other people have access to.
This can include work, if you have a desktop machine you leave running overnight or while away, and another employee or contractor (or even maintenance staff) can gain brief access.
If you’re concerned about others having access to your machine while it’s locked but not powered down, you can quit any running browsers, and PoisonTap has no effect unless someone left it plugged in, which is very risky for this kind of physical-access attack. You can also shut your computer down.
As more sites use encrypted connections preferentially and configure their servers to always force a browser that can make an https connection to do so, this problem starts to leak away, but will remain for any sites that don’t.
Operating system makers could prevent most USB and Thunderbolt attachments while a device is locked.
This seems obvious, except perhaps for a keyboard or mouse. OSes could also alert users about newly discovered networks and require approval. And they could block attempts to define a network as big as the whole Internet.
Nearly all networks that people routinely use are scoped to a very narrow range, typically a couple hundred addresses with the same first numbers (like 192.168.0.1 to 192.168.0.200). Anything beyond a couple of orders of magnitude used for a corporate or large public network should be blocked and an alert shown.
Browser makers could also prevent certain actions from happening on a massive scale. The kind of technique that Kamkar uses has little rational purpose, and might be possible to monitor for among other malicious behavior.
A user could be alerted, much like some browsers warn and then block excessive modal dialog alert boxes from appearing in a browser tab—the ones you have to click to dismiss.
Finally, router makers are way, way, way behind the curve already, and this is yet another way in which weak security practices allow ease of access.
Routers can be preconfigured with certificates that create secure connections over a local network, preventing malicious software of this kind or elsewhere on a network from sniffing and gaining access.
It may seem depressing to hear about an ostensibly easy-to-implement, irritating-to-block security hole that makes you want to pour glue into your computer ports. (That’s one solution, and used in some secure settings.)
But vigilance remains the watchword, coupled with giving feedback to the companies that make the products we use to keep upping the security they use and monitoring more heavily for automated behavior that couldn’t possibly be beneficial to a user.
A massive and sustained Internet attack that has caused outages and network congestion today for a large number of Web sites was launched with the help of hacked “Internet of Things” (IoT) devices, such as CCTV video cameras and digital video recorders, new data suggests.
Earlier today cyber criminals began training their attack cannons on Dyn, an Internet infrastructure company that provides critical technology services to some of the Internet’s top destinations.
The attack began creating problems for Internet users reaching an array of sites, including Twitter, Amazon, Tumblr, Reddit, Spotify and Netflix.
At first, it was unclear who or what was behind the attack on Dyn. But over the past few hours, at least one computer security firm has come out saying the attack involved Mirai, the same malware strain that was used in the record 620 Gpbs attack on my site last month.
At the end September 2016, the hacker responsible for creating the Mirai malware released the source code for it, effectively letting anyone build their own attack army using Mirai.
Mirai scours the Web for IoT devices protected by little more than factory-default usernames and passwords, and then enlists the devices in attacks that hurl junk traffic at an online target until it can no longer accommodate legitimate visitors or users.
According to researchers at security firm Flashpoint, today’s attack was launched at least in part by a Mirai-based botnet. Allison Nixon, director of research at Flashpoint, said the botnet used in today’s ongoing attack is built on the backs of hacked IoT devices — mainly compromised digital video recorders (DVRs) and IP cameras made by a Chinese hi-tech company called XiongMai Technologies. The components that XiongMai makes are sold downstream to vendors who then use it in their own products.
The default usernames and passwords on a Web-based administration panel that ships with the products, those machines can still be reached via more obscure, less user-friendly communications services called “Telnet” and “SSH.”
Telnet and SSH are command-line, text-based interfaces that are typically accessed via a command prompt (e.g., in Microsoft Windows, a user could click Start, and in the search box type “cmd.exe” to launch a command prompt, and then type “telnet” to reach a username and password prompt at the target host).
“The issue with these particular devices is that a user cannot feasibly change this password,” Flashpoint’s Zach Wikholm told KrebsOnSecurity. “The password is hardcoded into the firmware, and the tools necessary to disable it are not present. Even worse, the web interface is not aware that these credentials even exist.”
Flashpoint’s researchers said they scanned the Internet on Oct. 6 for systems that showed signs of running the vulnerable hardware, and found more than 515,000 of them were vulnerable to the flaws they discovered.
“I truly think this IoT infrastructure is very dangerous on the whole and does deserve attention from anyone who can take action,” Flashpoint’s Nixon said.
SVG(Scalable Vector Graphics) send by your friend may have Locky Ransomwares, avoid clicking it. By appending the Ransomware to an image file can Bypass Facebook security framework pretending to be an image file.
SVG (Scalable Vector Graphics):
SVG is an XML-based vector image format for two-dimensional graphicswith support for interactivity and animation. The SVGspecification is an open standard developed by the World Wide Web Consortium (W3C) since 1999. SVGimages and their behaviors are defined in XML text files.
Ransomware:
A type of malicious software designed to block access to a computer system until a sum of money is paid.
Why make’s it as a Dropper?
SVG images can be created and edited with any text editor, more often they are created directly with a software that elaborates the images.More specifically, this means that you can embed any content you want (such as JavaScript), additionally, any modern browser will therefore able to open this file.
How do we Remove Malicious Extensions
Firefox and Chrome has already blocked this extension and we hope Facebook will do that soon. Suppose if you are tricked into installing in this malware file you should remove them immediately.
To remove the offending extension, just go to Menu → More Tools → Extensions and check for the extension and remove it.Even worse, if you were infected with the ransomeware the only way is to restore the files. Stay safe.
Many security Experts are thrust into the uncomfortable position of dealing with a huge portfolio of potentially insecure applications, limited resources and an overwhelming sense of urgency.
Security Experts should ensure applications undergo security assessments, as applications have quickly become a favorite vector of malicious attackers seeking to disrupt day-to-day business activities or infiltrate corporate defenses to steal sensitive data.
In this tip, we’ll add some clarity to the enterprise application security assessment process by outlining the techniques used to review applications and comparing and contrasting strategic paradigms for application assessments.
1. The Big Bang Approach:
Perhaps the most traditional method is to focus testing resources on the applications with the most public exposure, such as the most widely used Internet-facing Web applications.
Once those apps are identified, comprehensive automated and manual runtime vulnerability assessments can be performed. Unfortunately, this approach ignores other critical albeit lower-profile applications, such as extranet apps, internal accounting applications and critical Intranet sites.
It’s important to remember that all Internet-facing applications are subject to external attack, regardless of how popular they are.
Moreover, the rising danger posed by insider threats and client-side vulnerabilities makes ignoring internal applications a significant risk. In addition, many experts in the application security community believe that blackbox testing alone is not as effective as combining source-code review with black/gray box assessments
2. The Steam Roller Approach:
Often when organizations realize the risks posed by The Big Bang Approach, they decide to broaden their comprehensive testing initiative to more applications during a longer period of time.
We’ve seen companies hire teams of penetration testers to test every Web application in the enterprise. As you can imagine, only a handful of organizations can afford this approach.
More importantly, the applications that aren’t tested right away may be exposed to attacks until both testing and remediation are completed; this can often take a year or more!
3. The Application Triaging Approach:
A preferred approach is to rank application risk using several factors, including a variety of assessment techniques based on an application’s risk profile. To start, look at the following dimensions of each application:
Purpose of the application: What is the application used for? How many people use it? A telephone directory application doesn’t have the same risk profile as an accounting application.
Data risk: Are confidentiality or integrity requirements tied to the application? Does the application or its servers need 99.999% availability? Is the application affected by any compliance drivers, such as PCI DSS, HIPAA, etc.?
Architecture and design: Is the application a Web application, Web service, client/server, mainframe, mid-tier, desktop or something else? Is it Internet or intranet facing? What programming language and framework was it developed in? Does the application use any known high-risk components such as Ajax or PHP? Approximately how large is the application (in lines of source code)?
Existing security features: What security features are already known to exist in the application? For example, how does the application perform authentication, authorization, input validation, etc.?
With this method, it’s important to build guidelines that assign numeric risk values for each of these factors. For example, “Add 25 points for Internet-facing applications,” “Subtract 5 points for applications that don’t share data or interfaces with any other applications,” etc.
The end result should be a number that allows you to rank applications against one another.
Remember that profiling applications is often time consuming and hard to perfect, so rather than forcing yourself to get all data for all applications, try to stick to a limit for how much time to spend gathering info on each app.
Your scoring methodology should be tolerant of imperfect information and should be able to rank applications against each other even if you have a deeper understanding of one versus another.
Don’t be too rigid about the scoring system — if a security expert sees an application as particularly high risk, but the scoring system does not backup his intuition, side with the security expert.
Applications in the high-risk bucket should undergo threat modeling, followed by manual and automated runtime vulnerability testing and source-code review.
Moderate-risk applications should be subject to automated runtime vulnerability testing and source-code review with manual verification. Low-risk applications may simply need to undergo runtime vulnerability testing and, time permitting, manual verification.
If the results of testing an application from the lower buckets are particularly negative, then the application should undergo more comprehensive testing.
4. The Health Check Approach:
An alternative to normal triaging is to perform short, one-day combined manual and automated runtime assessments on all applications. In this scenario, assessors limit automated scanning to a small number of test cases, substantially reducing scanning time (to close to an hour typically).
To do this, it’s important to reduce the total number of variants performed for each attack type, such as 10 cross-site scripting, 10 SQL injection, etc.
The manual component entails reviewing and validating the scan results and spending additional time to perform a limited set of manual tests.
Based on the results, an experienced assessor can decide whether to prioritize an application for additional assessment time or to defer additional testing until after reviewing higher-risk applications.
5. The Unauthenticated Health Check Approach:
An alternative to the Health Check Approach is to perform short 1-2 day automated runtime vulnerability assessment on allapplications in a short period of time without authentication credentials.
This approach mirrors the attack methods of script kiddies and bots, such as the infamous ASP SQL injection bot that continues to plague Web applications.
Consider this method in cases when it would be too difficult or time-consuming to get authentication credentials.
However, be cognizant that inmany applications authenticated users pose the most significant risks. Unauthenticated scans miss all these attacks.
So what’s the best approach? Aligning the assessment with business risk allows for meaningful prioritization of time and money. A hybrid of approaches is ideal: Immediately identify and comprehensively test a small set of the highest risk applications (e.g. your company.com website).
In parallel, start the application triaging process to determine what gets tested next. If the resources are available, begin the unauthenticated health check assessments while you’re triaging.
This process allows you to benefit from the broad analysis of profiling along with the objective results of a quick scan.
Follow up the rest of the process like a normal Risk Triaging Approach: Start with the highest risk apps and work toward the lowest.
Assessments, of course, are only one part of the entire application security equation. The next important step involves remediation.
Luckily, the triaging approach lays the ground work for prioritizing remediation: Start with the highest risk vulnerabilities in the highest risk apps, and move down from there.
A good application security team will also be able to identify root causes to system findings and suggest remediation steps in the software development lifecycle to make its applications more secure from the ground up.
Sensitive Data Exposure is difficult to exploit wheres prevalence and detect-ability is less common, but the impact is severe. Clearly if some sensitive data is leaked it will cause a severe fall out.
Here we have a user login’s into a website over HTTP which has no encryption, in this case attacker can get into the network and sniff the traffic which is also called as Man in the middle attack(MITM). Then attacker can clearly gain access to any of the data going over the connection.So they can easily retrieve user’s password, also the attacker can manipulate data sent over http.
Understanding Sensitive data Exposure
Insufficient use of SSL (Login page with http,Mixed mode,Cookies not sent securely).
Bad cryptography (Incorrect password usage,Weak algorithm,Poor protection of keys).
Some other risks (Browser auto-complete,Disclosure via URL,Leaked logs).
Common Defences
Minimize sensitive data collection(Reduce the window for storage).
Apply HTTPS everywhere (Login pages and everything should be https).
Use Cryptostorage for passwords (Use hash algorithms designed for password,Secure key Management).
The UK’s retailers have been warned to brace themselves for a barrage of fraud attempts this busy festive shopping season, with estimates claiming they’ll be hit by one million attacks each day.
Fraud prevention firm ThreatMetrix made the call based on data collected by its Digital Identity Network – which checks over 20 billion annual transactions supporting 30,000 websites and 4000 customers globally.
“These have evolved from being the traditional brute force attacks that were traditionally stopped by WAFs,” she added. “They’re now much cleverer, adopting low and slow attack rate patterns to masquerade as legitimate human traffic. They might even sneak in a good transaction to trick the system as they mass test and validate stolen identity credentials harvested from data breaches.”
It’s predicted that fraudsters will use the run up to Christmas – which now starts during the Black Friday shopping period following American Thanksgiving Day – to sneak through defenses.
Some 50 million global online fraud attacks are expected over the Black Friday and Cyber Monday shopping week.
“It’s not that fraudsters expect IT teams to take their eye off the ball, but they are opportunists, so are looking to take advantage of periods where their fraudulent transactions are less likely to be spotted,” ThreatMetrix product and data evangelist, Rebekah Moody, told Infosecurity.
This is the case because basket values are traditionally higher this time of year, meaning fraudsters will try to sneak through higher value transactions in the hope of not being spotted.
Another tactic which retailers may find hard to combat is when the cyber-criminal socially engineers a victim into downloading remote access software on their machine. Because they take over the account after the customer has legitimately logged in there are no unusual patterns for the retailer to spot.
Transaction volumes are also set to peak, so retailers often lower their risk tolerance to let more through without the added friction of fraud checks, explained Moody.
One of the main ways cyber-criminals are circumventing traditional fraud filters is by using automated bots.
“These have evolved from being the traditional brute force attacks that were traditionally stopped by WAFs,” she added. “They’re now much cleverer, adopting low and slow attack rate patterns to masquerade as legitimate human traffic. They might even sneak in a good transaction to trick the system as they mass test and validate stolen identity credentials harvested from data breaches.” Fraud prevention systems conducting behavioral analysis of users can help to spot bots and sudden changes in behavior that could indicate an account takeover, Moody claimed.
Unlock Iphone with Siri : Password are the basic level of validation with smartphones, it will acts as a defence for our sensitive data.
In the post we are to see how easy to break this password if you are having an Iphone, because of an bur with Siri.
Steps to bypass the Authentication
Step1 : Dial the Targeted Phone number.
Step2: In the targeted phone click message icon and choose to send an custom message in responding to the call.
Step3: Siri need to be activated by long-press the home button, and tell the phone through siri “Turn On VoiceOver” . VoiceOver is a gesture-based screen reader that lets you enjoy using iPhone even if you don’t see the screen.
Step4: Return to the message screen and double-click on the bar where the contact info is displayed, and immediately click on the on-screen keyboard. This may take multiple attempts to get the timing right, but you will know you’ve succeeded when you see the “Photo” icon and other options slide in from the side above the keyboard.
Step5: So now we can ask Siri to disable “Turn On VoiceOver” , now come back to message and simply type first letter of the caller ID in top bar, then tap Φ icon which help us to add/edit contacts.
Step6: Now can select photo to set for contact “yes now you are victim gallery you can see all photos”, but still the phone is locked.
Step7: Also you can select any contact and you can see all the information’s like a boss.
For an Vedio Demonstration :
How to stay Secure
Until Apple releases you can disable Siri for Lock screen or Restrict Siri in accessing photos.
To disable Siri for lock screen Settings → Touch ID & Passcode and Disable Siri on the Lockscreen
To remove Siri access for Gallery Settings → Privacy → Photos
A Chinese technology firm has been siphoning text messages and call records from cheap Android-based mobile smart phones and secretly sending the data to servers in China, researchers revealed this week.
Often retailing for between $50 and $100, the sleek and powerful devices sell so cheaply because they also require the user to accept on-screen advertisements.
According to research released this week, the low up-front cost of these smart phones may be subsidized not just by ads but by also by the theft of private information stolen from users.
The revelations came the same day the White House and the U.S. Department of Homeland Security issued sweeping guidelines aimed at building security into Internet-connected devices, and just hours before a key congressional panel sought recommendations from industry in regulating basic security standards for so-called “Internet of Things” (IoT) devices.
Researchers at Fairfax, Va.-based security firm Kryptowire say the ADUPS software gives the company near-total control over the devices that it runs on, and that they have proof ADUPS has abused that control to siphon personal data from countless consumers
The ADUPS technology is typically bundled with smart phones made by dozens of global wireless firms including ZTE, BLU and Huawei, and sold at popular consumer destinations like Amazon and BestBuy.
An About Us page at ADUPS’s Web site explains the company’s foothold in the IoT market.
According to research released this week, the low up-front cost of these smart phones may be subsidized not just by ads but by also by the theft of private information stolen from users.
Researchers at Fairfax, Va.-based security firm Kryptowire say the ADUPS software gives the company near-total control over the devices that it runs on, and that they have proof ADUPS has abused that control to siphon personal data from countless consumers.
In September 2016, Adups claimed on its web site to have a world-wide presence with over 700 million active users, and a market share exceeding 70% across over 150 countries and regions with offices in Shanghai, Shenzhen, Beijing, Tokyo, New Delhi, and Miami.
The web site also stated that it produces firmware that is integrated in more than 400 leading mobile operators, semiconductor vendors, and device manufacturers spanning from wearable and mobile devices to cars and televisions.
Comparison of Adups with 2011 CarrierIQ capabilities based on publicly available sources.
ADUPS claims on its Web site to have worldwide presence with more than 700 million active users, and that its firmware is integrated into “more than 400 leading mobile operators, semiconductor vendors and device manufacturers spanning from wearable and mobile devices to cars and televisions.”
“This is just one random device of theirs that we looked at,” Benameur said. “For a company that claims to provide over-the-air updates for 700 million devices, including cars and millions of IoT devices…this is really scary and unacceptable behavior.”