Meni
SL

Unimania: I Need Your Facebook Data, Location, And Your Browsing History

Privacy protection is basically what we do, so I never get tired of stories about how unpredictable the ways of getting Facebook user data are. Cambridge Analytica might be dead, but the business of stealing users’ data lives on, and this article demonstrates one more example of that.

The story begins with the recent research I conducted about fake ad blockers in the Chrome Web Store. The outcome of that research was that I received dozens of questions about whether this or that extension is safe to use. This made me take a deeper look into the most popular Chrome extensions, but even so, I had no idea at that time where this investigation was going to lead me. In fact, it exposed to me a huge spyware campaign that utilizes popular Android apps and Chrome extensions to steal Facebook data and the browsing histories of millions of users.

Suspicious Chrome extensions

I conducted an automated scan of all publicly available Chrome extensions. This scan flagged quite a few different privacy issues, which I will address in more specific detail in a forthcoming post.

One of the issues that immediately caught my attention, as I noticed suspicious requests made to various Facebook domains.

Meet these nasty Chrome extensions, currently in use by an estimated 420,000 users:

  • Album & Photo Manager For Facebook (92K+ users)
  • PDF Merge — PDF Files Merger (125K+ users)
  • Pixcam — Webcam Effects (31K+ users)

So, what is wrong with them? Let's dive into the details.

The inscrutable ways of your Facebook data

If you are logged into Facebook, these spyware extensions will scrape all your data immediately after the browser startup:

They even try to parse your purchase history! This alone is enough for these extensions to be booted from the Chrome Web Store.

All this data is then collected and sent to the um-public-panel-prod.s3.amazonaws.com domain, which is a named Amazon S3 instance rented by the spyware authors.

An alarming amount of data was being sent over to that server including all the Facebook "interests". In order to test this, I had to use my own account, so you can observe a piece of my own data, which I don't mind sharing with you.

As you can see on the screenshot, they do not send a plain FB identifier; instead, they send it in a hashed form. I imagine that they think that this practice allow the spyware group to say that this data has been made "anonymous."

“Dear spyware developers, come on! Do you really believe that hashing a numeric value with a static salt cannot be decoded?”

SHA1("sME9Azj8G28Y" + userId) = e5b1149132aab56eba55168d0b0c7a095ab066f2

By the way, dear reader, here is a contest for you: the first one to crack the hash and discover my FB ID gets a free AdGuard license. Write your answer in the comments. No cheating, please :)

But hey, what is the good of having this data without the spyware company also knowing what exactly you do on the Internet? Wouldn't it be so much better if they knew what exact posts you read or what exact ads you see? Well, no worries, that's exactly what they do: they siphon information about all of the posts, sponsored posts, tweets, the YouTube videos and ads you see or interact with, along with a poorly hashed user ID and totally UN-hashed location data.

Meet Unimania Inc.

Who is behind this activity? The only thing I knew about the authors was the link to their extensions' privacy policy: here's a copy, just in case. As usual, there's a lot of confusing legalese about how you provide them with consent without doing anything, how seriously they care about your privacy, how strongly your data is made (or kept) anonymous and how it can in no way can be traced back to you as it is protected by a powerful mathematical "hash function."

Fortunately, it is also pretty transparent about what exact information about you is collected:

What Information We Collect and How We Collect It. In general, the Information we collect includes nonpersonally identifiable demographic and psychographic data as well as sponsored campaigns, advertisements or posts that target you directly or that have been shared with you.

Also, I found their EULA: here's the copy, from which I learned that the company name is "Unimania, Inc." and they claim to be located in Tel-Aviv, Israel. However, I could not find any information on this company in the Israeli company register.

My story might have ended here, but there was a sentence in the privacy policy that caught my attention:

Background. You have been directed to this Privacy Policy from a separate and independent third party Google Chrome Extension or Mobile Software Application (“Third Party Software”).

Mobile Software Application

"Mobile Software Application!" I said to myself.

So this was not just a matter limited to Chrome extensions, and I realized that I needed to continue my investigation. To this end, some good news was that we already had some data collected while preparing a study on mobile apps tracking and I could make use of it and query it right away.

That's how I found one particular app that was connecting to the Unimania servers. This was an alternative Facebook client called "Fast — Social App" with a record of more than 10,000,000 installs according to Google Play. The app developer does not bother to hide that fact and mentions Unimania in the privacy policy:

Scanning this developer apps' traffic confirmed that "Fast-Social App" transfers pretty much the same data as the Chrome extensions do, and to the same Unimania servers. I also found out that "Fast Lite - Social App + Twitter" (1,000,000+ installs) also does the same thing.

Besides that, I found a couple more apps that mention Unimania in their privacy policies. I cannot confirm that they are still leaking user data, but I can assume they were doing so in the past; otherwise, why would they mention it?

Finally, it seems that Unimania is about to launch their own "products":

  • OmniSocial — a mobile app
  • Who's following me? — a browser extension

Obviously, none of these apps describe this behavior in the app description; neither do they have an "in-app disclosure" as required by Google. I must admit that the Google Play Developer Policies look solid, and so they are likely not the reason of why the privacy of Android apps is in such a sad state. The problem is that these policies are not enforced, hence most of the app developers simply ignore them.

Summary

Congratulations for reading through such a long article (or for skipping all the boring technical details and jumping straight to the summary)!

Let's summarize what we discovered.

  1. A huge spyware campaign engaging some Mobile Apps and Chrome extensions in stealing users’ Facebook data and spying on their social network browsing history. The list of the information collected by these apps and extensions includes the user’s Facebook profile data including demographics and the list of user interests. Also, they were collecting the users' browsing history including all the Facebook regular and sponsored posts, tweets, YouTube videos and ads.
  2. Four spyware Chrome extensions with aggegrated users count of more than 400,000 users.
  3. Two Android apps with total installs count of more than 11,000,000 selling out their users data.
  4. The campaign is run by a supposed Israeli company named "Unimania, Inc." Unfortunately, I was not able to trace this further back to Unimania’s owners or affiliates and I can't say who is profiting from the data.

I've reported all the discovered apps and extensions to Google and I hope they take corrective measures soon.

How to protect yourself?

The answer to this question is both very simple and very difficult.

When installing anything on your device or browser, follow these rules:

  • Read the privacy policy. It is not useless - everything discovered in this case was mentioned in the privacy policies.
  • Never ever install anything made by a developer you don't trust. Do your homework, find out who the developer is and decide for yourself if they are trustworthy.

Also, all Unimania domains have now been added to the "AdGuard Spyware filter" and will be blocked automatically if you have it enabled in any of our AdGuard products, or if you use AdGuard DNS. Unfortunately, there is a browser limitation that prevents an extension from controlling requests made by other extensions so using the AdGuard Chrome extension or uBlock Origin may not be enough, even if you have the "AdGuard Spyware filter" enabled.

Alternatively, you can block these three domains by adding them to the "hosts" file:

  • um-public-panel-prod.s3.amazonaws.com
  • collection-endpoint-prod.herokuapp.com
  • collection-endpoint-staging.herokuapp.com

UPD (Jun 3): The Android apps mentioned in the article are no more available on Google Play.
UPD (Jun 5): The Chrome extensions are finally taken down from the Chrome Web Store.

Vam je bila objava všeč?
18.310 18310 ocen uporabnikov
Odlično!

AdGuard za Windows

AdGuard za Windows ni le še en zaviralec oglasov, je večnamensko orodje, ki združuje vse potrebne funkcije za najboljšo spletno izkušnjo. Onemogoča oglase in nevarne spletne strani, pospeši nalaganje strani in ščiti vaše otroke, ko so na spletu.
S prenosom programa sprejemate pogoje Licenčne pogodbe
Več o tem
18.310 18310 ocen uporabnikov
Odlično!

AdGuard za macOS

Za razliko od drugih zaviralcev oglasov je AdGuard zasnovan z upoštevanjem posebnosti macOS. Ne zagotavlja le obrambe pred oglasi v Safariju in drugih brskalnikih, ampak vas tudi ščiti pred sledenjem, lažnim predstavljanjem in goljufijami.
S prenosom programa sprejemate pogoje Licenčne pogodbe
Več o tem
18.310 18310 ocen uporabnikov
Odlično!

AdGuard za Android

AdGuard za Android je idealna rešitev za mobilne naprave Android. V nasprotju z drugimi zaviralci oglasov AdGuard ne potrebuje korenskega dostopa in ponuja širok spekter funkcij: filtriranje v aplikacijah, upravljanje aplikacij in še veliko več.
S prenosom programa sprejemate pogoje Licenčne pogodbe
Več o tem
18.310 18310 ocen uporabnikov
Odlično!

AdGuard za iOS

Najboljši blokator oglasov iOS za iPhone in iPad. AdGuard odstrani vse vrste oglasov v Safariju, ščiti vašo zasebnost in pospeši nalaganje strani. Tehnologija blokiranja oglasov AdGuard za iOS zagotavlja filtriranje najvišje kakovosti in omogoča uporabo več filtrov hkrati
S prenosom programa sprejemate pogoje Licenčne pogodbe
Več o tem
18.310 18310 ocen uporabnikov
Odlično!

AdGuard VPN

74 lokacij svetovnega spleta

Dostop do katere koli vsebine

Močno šifriranje

Politika 'Brez dnevnikov'

Najhitrejša povezava

stalna podpora

Poskusite brezplačno
S prenosom programa sprejemate pogoje Licenčne pogodbe
Več o tem
18.310 18310 ocen uporabnikov
Odlično!

AdGuard Zaviralec vsebine

AdGuard Zaviralec oglasov bo odstranil vse vrste oglasov v mobilnih brskalnikih, ki podpirajo tehnologijo zaviralcev vsebin — in sicer Samsung Internet in Yandex.Browser. Čeprav je bolj omejen kot AdGuuard za Android, je brezplačen, preprost za namestitev in še vedno zagotavlja visoko kakovost onemogočanja oglasov.
S prenosom programa sprejemate pogoje Licenčne pogodbe
Več o tem
18.310 18310 ocen uporabnikov
Odlično!

AdGuard Razširitev brskalnika

AdGuard je najhitrejša in najlažja razširitev za zaviranje oglasov, ki učinkovito onemogoča vse vrste oglasov na vseh spletnih straneh! Za brskalnik, ki ga uporabljate, izberite AdGuard in hitro ter varno brskajte brez oglasov.
18.310 18310 ocen uporabnikov
Odlično!

AdGuard Pomočnik

Spremljevalna razširitev brskalnika za AdGuard namizno aplikacijo. Ponuja dostop do takšnih funkcij v brskalniku, kot so zaviranje elementov po meri, seznam dovoljenih spletnih strani ali pošiljanje poročila.
18.310 18310 ocen uporabnikov
Odlično!

AdGuard DNS

AdGuard DNS je brezhiben način zaviranja internetnih oglasov, ki ne zahteva nameščanja nobenih aplikacij. Je preprost za uporabo, popolnoma brezplačen, enostavno nastavljiv na kateri koli napravi in vam zagotavlja minimalne potrebne funkcije za zaviranje oglasov, števcev, zlonamernih spletnih strani in vsebine za odrasle.
18.310 18310 ocen uporabnikov
Odlično!

AdGuard Home

AdGuard Home je omrežni program za zaviranje oglasov in sledenja. Ko ga nastavite, bo pokril VSE vaše domače naprave in za to ne potrebujete nobenih programov na strani odjemalca. Z dvigom internetnih zadev in povezanih naprav, postaja vse bolj pomembno, da lahko nadzorujete celotno omrežje.
18.310 18310 ocen uporabnikov
Odlično!

AdGuard Pro za iOS

AdGuard Pro ima močno ponudbo odličnega onemogočanja oglasov za iOS v Safariju, ki ga uporabniki redne različice že poznajo. Z zagotavljanjem dostopa do nastavitev DNS po meri aplikacija omogoča zaviranje oglasov, zaščito vaših otrok pred vsebino za odrasle na spletu in varovanje vaših osebnih podatkov pred krajo.
S prenosom programa sprejemate pogoje Licenčne pogodbe
Več o tem
18.310 18310 ocen uporabnikov
Odlično!

AdGuard za Safari

Razširitve oglasov za zaviranje oglasov za Safari imajo težave, odkar je Apple začel vsiljevati vse, da uporabljajo nov SDK. Razširitev AdGuarda naj bi vrnila visoko kakovostno onemogočanje oglasov nazaj v Safari.
18.310 18310 ocen uporabnikov
Odlično!

AdGuard Temp Mail

Brezplačen ustvarjalec začasnih elektronskih naslovov, ki vas ohranja anonimne in ščiti vašo zasebnost. Brez neželene pošte v vašem glavnem predalu!
18.310 18310 ocen uporabnikov
Odlično!

AdGuard za Android TV

AdGuard za Android TV je edina aplikacija, ki zavira oglase, varuje vašo zasebnost in deluje kot požarni zid za vaš Smart TV. Prejmite opozorila o spletnih grožnjah, uporabite varen DNS in izkoristite šifriran promet. Sprostite se in se potopite v svoje najljubše oddaje z vrhunsko varnostjo in brez oglasov!
Prenos AdGuarda Za namestitev AdGuarda kliknite gumb, označen s puščico Izberite 'Odpri' in kliknite na 'Vredu', nato pa počakajte, da se datoteka prenese. V odprtem oknu povlecite ikono AdGuarda in jo spustite v mapo 'Aplikacije'. Hvala, ker ste izbrali AdGuard! Izberite 'Odpri' in kliknite na 'Vredu', nato pa počakajte, da se datoteka prenese. V odprtem oknu kliknite na 'Namesti'. Hvala, ker ste izbrali AdGuard!
Namestite AdGuard na svojo mobilno napravo