Menu
DA

Unimania: I Need Your Facebook Data, Location, And Your Browsing History

Privacy protection is basically what we do, so I never get tired of stories about how unpredictable the ways of getting Facebook user data are. Cambridge Analytica might be dead, but the business of stealing users’ data lives on, and this article demonstrates one more example of that.

The story begins with the recent research I conducted about fake ad blockers in the Chrome Web Store. The outcome of that research was that I received dozens of questions about whether this or that extension is safe to use. This made me take a deeper look into the most popular Chrome extensions, but even so, I had no idea at that time where this investigation was going to lead me. In fact, it exposed to me a huge spyware campaign that utilizes popular Android apps and Chrome extensions to steal Facebook data and the browsing histories of millions of users.

Suspicious Chrome extensions

I conducted an automated scan of all publicly available Chrome extensions. This scan flagged quite a few different privacy issues, which I will address in more specific detail in a forthcoming post.

One of the issues that immediately caught my attention, as I noticed suspicious requests made to various Facebook domains.

Meet these nasty Chrome extensions, currently in use by an estimated 420,000 users:

  • Album & Photo Manager For Facebook (92K+ users)
  • PDF Merge — PDF Files Merger (125K+ users)
  • Pixcam — Webcam Effects (31K+ users)

So, what is wrong with them? Let's dive into the details.

The inscrutable ways of your Facebook data

If you are logged into Facebook, these spyware extensions will scrape all your data immediately after the browser startup:

They even try to parse your purchase history! This alone is enough for these extensions to be booted from the Chrome Web Store.

All this data is then collected and sent to the um-public-panel-prod.s3.amazonaws.com domain, which is a named Amazon S3 instance rented by the spyware authors.

An alarming amount of data was being sent over to that server including all the Facebook "interests". In order to test this, I had to use my own account, so you can observe a piece of my own data, which I don't mind sharing with you.

As you can see on the screenshot, they do not send a plain FB identifier; instead, they send it in a hashed form. I imagine that they think that this practice allow the spyware group to say that this data has been made "anonymous."

“Dear spyware developers, come on! Do you really believe that hashing a numeric value with a static salt cannot be decoded?”

SHA1("sME9Azj8G28Y" + userId) = e5b1149132aab56eba55168d0b0c7a095ab066f2

By the way, dear reader, here is a contest for you: the first one to crack the hash and discover my FB ID gets a free AdGuard license. Write your answer in the comments. No cheating, please :)

But hey, what is the good of having this data without the spyware company also knowing what exactly you do on the Internet? Wouldn't it be so much better if they knew what exact posts you read or what exact ads you see? Well, no worries, that's exactly what they do: they siphon information about all of the posts, sponsored posts, tweets, the YouTube videos and ads you see or interact with, along with a poorly hashed user ID and totally UN-hashed location data.

Meet Unimania Inc.

Who is behind this activity? The only thing I knew about the authors was the link to their extensions' privacy policy: here's a copy, just in case. As usual, there's a lot of confusing legalese about how you provide them with consent without doing anything, how seriously they care about your privacy, how strongly your data is made (or kept) anonymous and how it can in no way can be traced back to you as it is protected by a powerful mathematical "hash function."

Fortunately, it is also pretty transparent about what exact information about you is collected:

What Information We Collect and How We Collect It. In general, the Information we collect includes nonpersonally identifiable demographic and psychographic data as well as sponsored campaigns, advertisements or posts that target you directly or that have been shared with you.

Also, I found their EULA: here's the copy, from which I learned that the company name is "Unimania, Inc." and they claim to be located in Tel-Aviv, Israel. However, I could not find any information on this company in the Israeli company register.

My story might have ended here, but there was a sentence in the privacy policy that caught my attention:

Background. You have been directed to this Privacy Policy from a separate and independent third party Google Chrome Extension or Mobile Software Application (“Third Party Software”).

Mobile Software Application

"Mobile Software Application!" I said to myself.

So this was not just a matter limited to Chrome extensions, and I realized that I needed to continue my investigation. To this end, some good news was that we already had some data collected while preparing a study on mobile apps tracking and I could make use of it and query it right away.

That's how I found one particular app that was connecting to the Unimania servers. This was an alternative Facebook client called "Fast — Social App" with a record of more than 10,000,000 installs according to Google Play. The app developer does not bother to hide that fact and mentions Unimania in the privacy policy:

Scanning this developer apps' traffic confirmed that "Fast-Social App" transfers pretty much the same data as the Chrome extensions do, and to the same Unimania servers. I also found out that "Fast Lite - Social App + Twitter" (1,000,000+ installs) also does the same thing.

Besides that, I found a couple more apps that mention Unimania in their privacy policies. I cannot confirm that they are still leaking user data, but I can assume they were doing so in the past; otherwise, why would they mention it?

Finally, it seems that Unimania is about to launch their own "products":

  • OmniSocial — a mobile app
  • Who's following me? — a browser extension

Obviously, none of these apps describe this behavior in the app description; neither do they have an "in-app disclosure" as required by Google. I must admit that the Google Play Developer Policies look solid, and so they are likely not the reason of why the privacy of Android apps is in such a sad state. The problem is that these policies are not enforced, hence most of the app developers simply ignore them.

Summary

Congratulations for reading through such a long article (or for skipping all the boring technical details and jumping straight to the summary)!

Let's summarize what we discovered.

  1. A huge spyware campaign engaging some Mobile Apps and Chrome extensions in stealing users’ Facebook data and spying on their social network browsing history. The list of the information collected by these apps and extensions includes the user’s Facebook profile data including demographics and the list of user interests. Also, they were collecting the users' browsing history including all the Facebook regular and sponsored posts, tweets, YouTube videos and ads.
  2. Four spyware Chrome extensions with aggegrated users count of more than 400,000 users.
  3. Two Android apps with total installs count of more than 11,000,000 selling out their users data.
  4. The campaign is run by a supposed Israeli company named "Unimania, Inc." Unfortunately, I was not able to trace this further back to Unimania’s owners or affiliates and I can't say who is profiting from the data.

I've reported all the discovered apps and extensions to Google and I hope they take corrective measures soon.

How to protect yourself?

The answer to this question is both very simple and very difficult.

When installing anything on your device or browser, follow these rules:

  • Read the privacy policy. It is not useless - everything discovered in this case was mentioned in the privacy policies.
  • Never ever install anything made by a developer you don't trust. Do your homework, find out who the developer is and decide for yourself if they are trustworthy.

Also, all Unimania domains have now been added to the "AdGuard Spyware filter" and will be blocked automatically if you have it enabled in any of our AdGuard products, or if you use AdGuard DNS. Unfortunately, there is a browser limitation that prevents an extension from controlling requests made by other extensions so using the AdGuard Chrome extension or uBlock Origin may not be enough, even if you have the "AdGuard Spyware filter" enabled.

Alternatively, you can block these three domains by adding them to the "hosts" file:

  • um-public-panel-prod.s3.amazonaws.com
  • collection-endpoint-prod.herokuapp.com
  • collection-endpoint-staging.herokuapp.com

UPD (Jun 3): The Android apps mentioned in the article are no more available on Google Play.
UPD (Jun 5): The Chrome extensions are finally taken down from the Chrome Web Store.

Syntes om dette indlæg?
18.355 18355 brugeranmeldelser
Fremragende!

AdGuard til Windows

AdGuard til Windows er mere end en adblocker, den er et multifunktionsværktøj, der blokerer annoncer, styrer adgangen til farlige websteder, accelererer sideindlæsning og beskytter børn mod upassende indhold.
Ved at downloade programmet accepterer du betingelserne i Licensaftalen
Læs mere
18.355 18355 brugeranmeldelser
Fremragende!

AdGuard til Mac

AdGuard til Mac er en unik adblocker designet med macOS i tankerne. Ud over at beskytte mod irriterende annoncer i browsere og apps, beskytter den også mod sporing, phishing og svindel.
Ved at downloade programmet accepterer du betingelserne i Licensaftalen
Læs mere
18.355 18355 brugeranmeldelser
Fremragende!

AdGuard til Android

AdGuard til Android er den perfekt løsning til Android-enheder. Modsat mange andre adblockere, kræver AdGuard ikke root-adgang, og den har en bred vifte af app-håndteringsmuligheder.
Ved at downloade programmet accepterer du betingelserne i Licensaftalen
Læs mere
18.355 18355 brugeranmeldelser
Fremragende!

AdGuard til iOS

Den bedste iOS-adblocker til iPhone og iPad. AdGuard eliminerer alle annoncetyper i Safari, beskytte fortroligheden og gør sideindlæsninger hurtigere. Adblockingteknologien i AdGuard til iOS sikrer den bedste filtreringskvalitet samt muliggør brug af flere filtre samtidigt
Ved at downloade programmet accepterer du betingelserne i Licensaftalen
Læs mere
18.355 18355 brugeranmeldelser
Fremragende!

AdGuard VPN

74 placeringer verden over

Adgang til alle typer indhold

Stærk kryptering

Ingen logning-politik

Hurtigste forbindelse

24/7-support

Afprøv gratis
Ved at downloade programmet accepterer du betingelserne i Licensaftalen
Læs mere
18.355 18355 brugeranmeldelser
Fremragende!

AdGuard Indholdsblocker

AdGuard Content Blocker eliminerer alle former for annoncer i mobilwebbrowsere, som understøtter indholdsblokeringsteknologi — dvs. Samsung Internet og Yandex.Browser. Selvom den er mere begrænset end AdGuard til Android, er den gratis, nem at installere og giver stadig en høj adblockingkvalitet.
Ved at downloade programmet accepterer du betingelserne i Licensaftalen
Læs mere
18.355 18355 brugeranmeldelser
Fremragende!

AdGuard Browserudvidelse

AdGuard er den hurtigste og mest letvægts adblockerudvidelse, der effektivt blokerer alle former for annoncer på alle websider! Vælg AdGuard til den benyttede webbrowser og få annoncefri, hurtig og sikker browsing.
18.355 18355 brugeranmeldelser
Fremragende!

AdGuard Assistent

En ledsagende browserudvidelse til AdGuard computer-apps. I webbrowseren giver den adgang til funktioner såsom tilpasset elementblokering, webstedshvidlisting eller rapportafsendelse.
18.355 18355 brugeranmeldelser
Fremragende!

AdGuard DNS

AdGuard DNS er en idiotsikker måde at blokere Internetannoncer på, der ikke kræver nogle programinstallationer. Den er nemt at bruge, fuldstændig gratis, let at opsætte på en hvilken som helst enhed, og den giver dig de som minimum nødvendige funktioner til at blokere annoncer, tællere, ondsindede websteder og voksenindhold.
18.355 18355 brugeranmeldelser
Fremragende!

AdGuard Home

AdGuard Home er en software på netværksniveau til blokering af annoncer og sporing. Den vil efter opsætningen dække ALLE dine hjemmeenheder uden behov for installation af klient-software. Med udbredelsen af Internet-Of-Things og forbundne enheder bliver det mere og mere vigtigt at kunne styre hele sit netværk.
18.355 18355 brugeranmeldelser
Fremragende!

AdGuard Pro til iOS

AdGuard Pro har meget at tilbyde udover den fremragende iOS-annonceblokering i Safari, der allerede er kendt af brugerne af den almindelige version. Ved at give adgang til tilpassede DNS-indstillinger, lader appen dig blokere annoncer, beskytte dine børn mod voksenindhold online og beskytte dine personlige data mod tyveri.
Ved at downloade programmet accepterer du betingelserne i Licensaftalen
Læs mere
18.355 18355 brugeranmeldelser
Fremragende!

AdGuard til Safari

Adblocking-udvidelser til Safari har haft det hårdt siden Apple begyndte at tvinge alle til at bruge det nye SDK. AdGuard-udvidelsen sigter mod at bringe højkvalitets annonceblokering tilbage til Safari.
18.355 18355 brugeranmeldelser
Fremragende!

AdGuard Temp Mail

Adressegenerator til en gratis midlertidig e-mail, der holder dig anonym og beskytter fortroligheden. Ingen spam i den primære indbakke!
18.355 18355 brugeranmeldelser
Fremragende!

AdGuard til Android TV

AdGuard til Android TV er den eneste app, der blokerer annoncer, beskytter fortroligheden og fungerer som en firewall til Smart TV'et. Bliv advaret om webtrusler, brug sikker DNS og drag fordel af krypteret trafik. Slap af og dyk ned i dine yndlingsprogrammer med førsteklasses sikkerhed og nul annoncer!
AdGuard-download er startet Klik på den af pilen angivet knap for at starte installationen. Vælg "Åbn" og klik på "OK". Afvent at filen downloades. I det åbnede vindue, træk AdGuard-ikonet til "Apps"-mappen. Tak fordi du valgte AdGuard! Vælg "Åbn" og klik på "OK". Afvent at filen downloades. I det åbnede vindue, klik på "Installér". Tak fordi du valgte AdGuard!
Installér også AdGuard til mobilenheder