meni
SR

Unimania: I Need Your Facebook Data, Location, And Your Browsing History

Privacy protection is basically what we do, so I never get tired of stories about how unpredictable the ways of getting Facebook user data are. Cambridge Analytica might be dead, but the business of stealing users’ data lives on, and this article demonstrates one more example of that.

The story begins with the recent research I conducted about fake ad blockers in the Chrome Web Store. The outcome of that research was that I received dozens of questions about whether this or that extension is safe to use. This made me take a deeper look into the most popular Chrome extensions, but even so, I had no idea at that time where this investigation was going to lead me. In fact, it exposed to me a huge spyware campaign that utilizes popular Android apps and Chrome extensions to steal Facebook data and the browsing histories of millions of users.

Suspicious Chrome extensions

I conducted an automated scan of all publicly available Chrome extensions. This scan flagged quite a few different privacy issues, which I will address in more specific detail in a forthcoming post.

One of the issues that immediately caught my attention, as I noticed suspicious requests made to various Facebook domains.

Meet these nasty Chrome extensions, currently in use by an estimated 420,000 users:

  • Album & Photo Manager For Facebook (92K+ users)
  • PDF Merge — PDF Files Merger (125K+ users)
  • Pixcam — Webcam Effects (31K+ users)

So, what is wrong with them? Let's dive into the details.

The inscrutable ways of your Facebook data

If you are logged into Facebook, these spyware extensions will scrape all your data immediately after the browser startup:

They even try to parse your purchase history! This alone is enough for these extensions to be booted from the Chrome Web Store.

All this data is then collected and sent to the um-public-panel-prod.s3.amazonaws.com domain, which is a named Amazon S3 instance rented by the spyware authors.

An alarming amount of data was being sent over to that server including all the Facebook "interests". In order to test this, I had to use my own account, so you can observe a piece of my own data, which I don't mind sharing with you.

As you can see on the screenshot, they do not send a plain FB identifier; instead, they send it in a hashed form. I imagine that they think that this practice allow the spyware group to say that this data has been made "anonymous."

“Dear spyware developers, come on! Do you really believe that hashing a numeric value with a static salt cannot be decoded?”

SHA1("sME9Azj8G28Y" + userId) = e5b1149132aab56eba55168d0b0c7a095ab066f2

By the way, dear reader, here is a contest for you: the first one to crack the hash and discover my FB ID gets a free AdGuard license. Write your answer in the comments. No cheating, please :)

But hey, what is the good of having this data without the spyware company also knowing what exactly you do on the Internet? Wouldn't it be so much better if they knew what exact posts you read or what exact ads you see? Well, no worries, that's exactly what they do: they siphon information about all of the posts, sponsored posts, tweets, the YouTube videos and ads you see or interact with, along with a poorly hashed user ID and totally UN-hashed location data.

Meet Unimania Inc.

Who is behind this activity? The only thing I knew about the authors was the link to their extensions' privacy policy: here's a copy, just in case. As usual, there's a lot of confusing legalese about how you provide them with consent without doing anything, how seriously they care about your privacy, how strongly your data is made (or kept) anonymous and how it can in no way can be traced back to you as it is protected by a powerful mathematical "hash function."

Fortunately, it is also pretty transparent about what exact information about you is collected:

What Information We Collect and How We Collect It. In general, the Information we collect includes nonpersonally identifiable demographic and psychographic data as well as sponsored campaigns, advertisements or posts that target you directly or that have been shared with you.

Also, I found their EULA: here's the copy, from which I learned that the company name is "Unimania, Inc." and they claim to be located in Tel-Aviv, Israel. However, I could not find any information on this company in the Israeli company register.

My story might have ended here, but there was a sentence in the privacy policy that caught my attention:

Background. You have been directed to this Privacy Policy from a separate and independent third party Google Chrome Extension or Mobile Software Application (“Third Party Software”).

Mobile Software Application

"Mobile Software Application!" I said to myself.

So this was not just a matter limited to Chrome extensions, and I realized that I needed to continue my investigation. To this end, some good news was that we already had some data collected while preparing a study on mobile apps tracking and I could make use of it and query it right away.

That's how I found one particular app that was connecting to the Unimania servers. This was an alternative Facebook client called "Fast — Social App" with a record of more than 10,000,000 installs according to Google Play. The app developer does not bother to hide that fact and mentions Unimania in the privacy policy:

Scanning this developer apps' traffic confirmed that "Fast-Social App" transfers pretty much the same data as the Chrome extensions do, and to the same Unimania servers. I also found out that "Fast Lite - Social App + Twitter" (1,000,000+ installs) also does the same thing.

Besides that, I found a couple more apps that mention Unimania in their privacy policies. I cannot confirm that they are still leaking user data, but I can assume they were doing so in the past; otherwise, why would they mention it?

Finally, it seems that Unimania is about to launch their own "products":

  • OmniSocial — a mobile app
  • Who's following me? — a browser extension

Obviously, none of these apps describe this behavior in the app description; neither do they have an "in-app disclosure" as required by Google. I must admit that the Google Play Developer Policies look solid, and so they are likely not the reason of why the privacy of Android apps is in such a sad state. The problem is that these policies are not enforced, hence most of the app developers simply ignore them.

Summary

Congratulations for reading through such a long article (or for skipping all the boring technical details and jumping straight to the summary)!

Let's summarize what we discovered.

  1. A huge spyware campaign engaging some Mobile Apps and Chrome extensions in stealing users’ Facebook data and spying on their social network browsing history. The list of the information collected by these apps and extensions includes the user’s Facebook profile data including demographics and the list of user interests. Also, they were collecting the users' browsing history including all the Facebook regular and sponsored posts, tweets, YouTube videos and ads.
  2. Four spyware Chrome extensions with aggegrated users count of more than 400,000 users.
  3. Two Android apps with total installs count of more than 11,000,000 selling out their users data.
  4. The campaign is run by a supposed Israeli company named "Unimania, Inc." Unfortunately, I was not able to trace this further back to Unimania’s owners or affiliates and I can't say who is profiting from the data.

I've reported all the discovered apps and extensions to Google and I hope they take corrective measures soon.

How to protect yourself?

The answer to this question is both very simple and very difficult.

When installing anything on your device or browser, follow these rules:

  • Read the privacy policy. It is not useless - everything discovered in this case was mentioned in the privacy policies.
  • Never ever install anything made by a developer you don't trust. Do your homework, find out who the developer is and decide for yourself if they are trustworthy.

Also, all Unimania domains have now been added to the "AdGuard Spyware filter" and will be blocked automatically if you have it enabled in any of our AdGuard products, or if you use AdGuard DNS. Unfortunately, there is a browser limitation that prevents an extension from controlling requests made by other extensions so using the AdGuard Chrome extension or uBlock Origin may not be enough, even if you have the "AdGuard Spyware filter" enabled.

Alternatively, you can block these three domains by adding them to the "hosts" file:

  • um-public-panel-prod.s3.amazonaws.com
  • collection-endpoint-prod.herokuapp.com
  • collection-endpoint-staging.herokuapp.com

UPD (Jun 3): The Android apps mentioned in the article are no more available on Google Play.
UPD (Jun 5): The Chrome extensions are finally taken down from the Chrome Web Store.

Svidela vam se ova objava?
18.322 18322 recenzije
Odlično!

AdGuard za Windows

AdGuard za Windows je više od blokatora reklama. To je višenamenska alatka koja blokira reklame, kontroliše pristup opasnim lokacijama, ubrzava učitavanje stranica i štiti decu od neprikladnog sadržaja.
Preuzimanjem programa prihvate uslove licenčnog ugovora
Saznajte više
18.322 18322 recenzije
Odlično!

AdGuard za Mac

AdGuard za Mac je jedinstveni blokator reklama dizajniran sa macOS-om na umu. Pored toga što vas štiti od dosadnih oglasa u pregledačima i aplikacijama, štiti vas od praćenja, phishinga i prevare.
Preuzimanjem programa prihvate uslove licenčnog ugovora
Saznajte više
18.322 18322 recenzije
Odlično!

AdGuard za Android

AdGuard za Android je idealno rešenje za Android mobilne uređaje. za razliku od drugih blokatora reklama, AdGuard ne zahteva root pristup i donosi širok spektar mogućnosti: filtriranje u aplikacijama, upravljanje aplikacijama i još mnogo toga.
Preuzimanjem programa prihvate uslove licenčnog ugovora
Saznajte više
18.322 18322 recenzije
Odlično!

AdGuard za iOS

Najbolji blokator reklama za iPhone i iPad na iOS-u. AdGuard eliminiše sve vrste reklama u Safariju, štiti vašu privatnost i ubrzava učitavanje stranica. AdGuard za iOS koristi tehnologiju blokiranja reklama koja garantuje najviši kvalitet filtriranja i omogućava vam da istovremeno koristite više filtera
Preuzimanjem programa prihvate uslove licenčnog ugovora
Saznajte više
18.322 18322 recenzije
Odlično!

AdGuard VPN

74 lokacija širom sveta

Pristup bilo kom sadržaju

Jako šifrovanje

Nema prikupljanja dnevnika

Najbrža veza

24/7 podrška

Probajte besplatno
Preuzimanjem programa prihvate uslove licenčnog ugovora
Saznajte više
18.322 18322 recenzije
Odlično!

AdGuard blokator sadržaja

AdGuard blokator sadržaja će eliminisati sve reklame u mobilnim preglednicima koji podržavaju tehnologiju blokatora sadržaja. Tu spadaju Samsung Internet i Yandex.Browser. Iako je prilično ograničen u odnosu na AdGuard za Android, besplatan je, lako se instalira i ima visok kvalitet blokiranja reklama.
Preuzimanjem programa prihvate uslove licenčnog ugovora
Saznajte više
18.322 18322 recenzije
Odlično!

AdGuard proširenje za preglednike

AdGuard je najbrže i najlakše proširenje za blokiranje reklama koje uspešno blokira sve vrste reklama na svim veb stranicama! Izaberite AdGuard za preglednik koji koristite i uživajte u surfovanju bez reklama, koje će postati sigurno i brzo.
18.322 18322 recenzije
Odlično!

AdGuard pomoćnik

Pridruženo proširenje za preglednike za AdGuard aplikacije radne površine. Nudi pristup iz preglednika mogućnostima kao što su prilagođeno blokiranje elemenata, dodavanje sajta na belu listu ili slanje prijave.
18.322 18322 recenzije
Odlično!

AdGuard DNS

AdGuard DNS je alternativno rešenje za blokiranje reklama, zaštitu privatnosti i roditeljsku kontrolu. Lako se postavlja i besplatan je za korišćenje. On obezbeđuje neophodni minimum zaštite od reklama na mreži, praćenja i fišinga, bez obzira koju platformu i uređaj koristite.
18.322 18322 recenzije
Odlično!

AdGuard Home

AdGuard Home je mrežni softver za blokiranje reklama i praćenja. Nakon što ga podesite, pokrivaće SVE vaše kućne uređaje i neće vam trebati nijedan klijentski softver za to. Sa porastom IoT i povezanih uređaja, postaje sve važnija mogućnost kontrolisanja vaše čitave mreže.
18.322 18322 recenzije
Odlično!

AdGuard Pro za iOS

AdGuard Pro nudi mnogo više od odličnog blokiranja reklama u Safariju koje je poznato korisnicima regularne verzije. Donoseći pristup prilagođenim DNS postavkama, dozvoljeno vam je da blokirate reklame, zaštitite vašu decu od sadržaja za odrasle na mreži i da zaštitite vaše lične podatke od krađe.
Preuzimanjem programa prihvate uslove licenčnog ugovora
Saznajte više
18.322 18322 recenzije
Odlično!

AdGuard za Safari

Proširenja za blokiranje reklama za Safari su u teškom položaju odkad je Apple započeo da nameće korišćenje novog SDK-a. AdGuard proširenje će se vratiti sa najkvalitetnijim blokiranjem reklama u Safariju.
18.322 18322 recenzije
Odlično!

AdGuard Temp Mail

Besplatan generator privremenih email adresa koji vas čuva anonimnim i štiti vašu privatnost. Nema spama u vašem glavnom sandučetu!
18.322 18322 recenzije
Odlično!

AdGuard za Android TV

AdGuard for Android TV is the only app that blocks ads, guards your privacy, and acts as a firewall for your Smart TV. Get warnings about web threats, use secure DNS, and benefit from encrypted traffic. Relax and dive into your favorite shows with top-notch security and zero ads!
Preuzimanje AdGuard Da biste instalirali AdGuard, kliknite na datoteku označenu strelicom Izaberite „Otvori“ i kliknite na „U redu“, a zatim sačekajte da se datoteka preuzme. U otvorenom prozoru prevucite ikonu AdGuard u fasciklu „Aplikacije“. Hvala vam što ste izabrali AdGuard! Izaberite „Otvori“ i kliknite na „U redu“, a zatim sačekajte da se datoteka preuzme. U otvorenom prozoru kliknite na „Instaliraj“. Hvala vam što ste izabrali AdGuard!
Instalirajte AdGuard na svoj mobilni uređaj