Notebookcheck Logo

Igexin use their advertising SDK to siphon user data back to their servers in China

Not all apps using the Igexin SDK were found to be collecting data, but they all had the potential to do it. (Source: Pixabay)
Not all apps using the Igexin SDK were found to be collecting data, but they all had the potential to do it. (Source: Pixabay)
Igexin, the developer of an advertising software kit, has been caught collecting user data and sending it back to servers in China. Their kit was used in 500 legitimate applications and used the permissions granted to those apps to collect data such as call logs. Google has disabled the compromised applications while the developers replace the advertising APIs.

In 2016, the Chinese firmware developer 'Adups' was caught inserting malicious code into firmware delivered to devices such as those by BLU and the B&N Nook. Now, in 2017, malware researchers from 'Lookout' have found that a software development kit (SDK) by Ixegin for inserting advertising was collecting user data and reporting it back to Igexin servers in China.

The researchers noticed that malware was being found on newly reset phones after they had made contact with Igexin's servers. The SDK was used in around 500 legitimate applications, several of which had over one million downloads and one had over 50 million downloads. Igexin was using the permissions granted to these apps to execute malicious commands designed to collect a range of data such as call logs, as well as silently downloading and running malicious code.

The researchers notified Google, who responded by disabling the compromised applications while developers issue updates using an alternative advertising SDK. None of the compromised applications have been identified since the app developers weren't aware of the malicious code, but the list of affected applications includes games, weather apps, photo editors, internet radio and more.

Source(s)

static version load dynamic
Loading Comments
Comment on this article
Please share our article, every link counts!
> Expert Reviews and News on Laptops, Smartphones and Tech Innovations > News > News Archive > Newsarchive 2017 08 > Igexin use their advertising SDK to siphon user data back to their servers in China
Craig Ward, 2017-08-23 (Update: 2017-08-24)