Security Bits logo - a green padlock with the words Security Bits to the right and in tiny letters below ithat it says 10101010 indicating a digital lock

Security Bits — 29 January 2025

Feedback & Followups

Deep Dive 1 — Data Breach Exposes Elicit Location Tracking via Ad Auctions

TL;DR — if you see an ad in an app it can track you, and your only effective defence is avoiding all apps with ads.

A data breach at a data broker has has exposed a nefarious abuse of the real time bidding system used by ad brokers to sell ad spots in apps. This technique allows malicious ad agencies to disregard user preferences and track smart phone user’s location as they used apps with ads without the app developers’ awareness, let alone consent. In fact, the ad agencies didn’t even need to win the auctions to steal the data, they just had to bit on the ad slots.

The key to this tracking technique is capturing the data and metadata presented to ad brokers during the auctions. This data includes the name of the app, and the IP address of the device running the app. With all the other data these ad brokers have about users they were able to join the dots and add more or less accurate locations to the profiles they build on users, which they could then sell to location brokers.

Because this is happening within the ad industry’s back-end, not collaboration is required from app developers (other than choosing to embed ad). There are no explicit API calls to the data brokers, and it’s not even that location tracking API calls have been snuck into other useful code libraries. From the app’s point of view they’re just sending entirely normal ad placement offers to their ad broker and receiving the ads that win the bid in response.

Because the developers are out of the loop, the leaked data reveals that really major apps are being abused to track users without their consent including:

  • CandyCrush
  • Temple Run
  • My Fitness Pal
  • My Period Calendar & Tracker
  • Tinder
  • Tumblr
  • Office365 apps
  • Yahoo Email
  • FlightRadar24
  • Various Christian & Muslim prayer book apps
  • Many VPN apps

The ad companies have no permission or consent to do any of this, they just abuse any and all crumbs of data and metadata the can glean from the massive back-end the powers the modern ad ecosystem to track users anyway.

How Can we Defend Ourselves?

Note that this attack vector is specific to ads in apps, so our exiting browser protections and ad blocking plugins are not in play here.

It’s important to underscore the fact that this is happening within the advertising industry’s back-end, not on user devices, so things like iOS App Tracking Transparency and App Store review processes can’t stop this (at least not with anything short of OS-level blocking of all connections to ad-related IP addresses which is not practical or realistic!)

That said iOS can dent the effectiveness of these attacks using App Tracking Transparency because when you ask an app not to track the OS stops the app from using the location services API to add explicit location data to the ad metadata, limiting the malicious trackers to approximate location data inferred from your IP address.

At this stage we simply have to assume that every ad we see in any app is an opportunity for hostile actors to track us, so the best we can do is avoid all in-app ads by not using apps that monetise with ads, or upgrading to ad-free versions with in-app purchases or paid memberships/subscriptions.

Links

Deep Dive 2 — A Massive New Password Leak and an Important New Feature in Have I Been Pwned (HIBP)

Data stealer malware is on the rise, and, one of the kinds of data these malicious tools steal is login information. By various means including keyboard loggers, scans of files, and browser hacks, attackers build up databases of website, email address, and password records, which they can then sell on the dark web.

Like all organisations, cybercrime gangs make mistakes, so from time to time these databases of stolen passwords leak. That happened recently when 71 million login credentials were leaked to Troy Hunt’s Have-I-Been-Pwnd service.

The problem for Troy was that this new type of data breach didn’t fit nicely into HIBP’s original design. The service was designed to let people know when a specific website lost their details, so each breach was tied to a single website implicitly. If you were in one of the LinkedIn breaches then it was your LinkedIn account that was compromised!

Stealer logs break this one-to-one mapping between websites and data breaches. Knowing that an account with your email address was included in a database of username and password pairs for millions of sites is not really that useful, the obvious next question has to be “on what sites?”!

That’s the problem HIBP have just addressed with a new set of related features for individuals and organisations:

  • Individuals can now see the websites their email address was associated with in any stealer logs added to HIBP. This new functionality has simply been added to the existing free report anyone can get for an email address they have access to — simply request a report for your email address, complete the ownership verification challenge, and see just how pwned your address is 🙂
  • Organisations with paid subscriptions (not the free up-to-10-compromised-users tier) can access this updated information via a new API end-point for all email addresses on all domains they have proven ownership of and added to their accounts.

If you haven’t done so already, I’d recommend signing up for free breach notifications on your primary email address or addresses using the Notify Me button on the banner at the top of the Have-I-Been-Pwnd home page. While you’re there you might want to see your current report by entering your address into the giant big search box at the top of this page.

Links

  • Troy Hunt’s explanation of why HIBP needed this new feature, and how it works — www.troyhunt.com/…

❗ Action Alerts

Worthy Warnings

Notable News

  • 🧯 Security researchers have found a critical vulnerability in a proprietary USB-C controller Apple use in many of their devices. But, at least for now, attacks are not practical, so there’s nothing regular users need to do — appleinsider.com/…
    • As the bug is now known Apple are likely to at least try to patch it
    • It’s possible additional weaknesses or exploit techniques will be discovered, making this a real concern for regular users in the future, and if that happens we’ll flag that in a future Security Bits
    • For now, the most likely outcome may be new tethered iPhone jail breaks
  • 🇺🇸 The US government has launched the US Cyber Trust Mark smart device certification promised in 2023 — thehackernews.com/… (cybersecurity baseline for internet-connected devices)
    • > Consumers can scan the QR code included next to the Cyber Trust Mark labels for additional security information, such as instructions on changing the default password, steps for securely configuring the device, details on automatic updates (including how to access them if they are not automatic), the product’s minimum support period, and a notification if the manufacturer does not offer updates for the device.
  • 🇺🇸 Biden signs executive order to bolster national cybersecurity — www.bleepingcomputer.com/…
    • Boring but important basics to give US government agencies more tools for fighting back, including sanctioning malicious attack groups
    • Not a new order but an update to an existing order from the Obama administration — not controversial, so unlikely to be rolled back by the new administration
  • 🇺🇸 FTC orders GoDaddy to fix poor web hosting security practices — www.bleepingcomputer.com/…

  • 🇮🇳 India moves closer to becoming the next major market to pass broad data protection laws with the opening up for public comment of the proposed Digital Personal Data Protection (DPDP) Rules — thehackernews.com/… (quite GDPR-like all in all laying out responsibilities for those holding personal data)

Top Tips

  • Given some recent moderation changes and the general state of polarisation ATM, you might be in the Mood to start the new year with a few fewer social media accounts: How to Delete Your Social Media Accounts: Facebook, X, Instagram, TikTok, and More — www.intego.com/…
    • Note from Bart: I recommend not actually deleting accounts unless they are completely anonymous, but going dormant by simply removing the app from your home screens and disabling notifications. You don’t want others to be able to steal your digital identity by re-creating an account with the same username!
    • Related: Mastodon have formally moved their copyrights, other intellectual property, and other assets into a European non-profit (making sure the Mastodon creator Eugen Rochko can’t do a Mulleweg and get Mastodon into the kind of mess WordPress is now in) — blog.joinmastodon.org/…

Interesting Insights

Palate Cleansers

Legend

When the textual description of a link is part of the link it is the title of the page being linked to, when the text describing a link is not part of the link it is a description written by Bart.

Emoji Meaning
🎧 A link to audio content, probably a podcast.
A call to action.
flag The story is particularly relevant to people living in a specific country, or, the organisation the story is about is affiliated with the government of a specific country.
📊 A link to graphical content, probably a chart, graph, or diagram.
🧯 A story that has been over-hyped in the media, or, “no need to light your hair on fire” 🙂
💵 A link to an article behind a paywall.
📌 A pinned story, i.e. one to keep an eye on that’s likely to develop into something significant in the future.
🎩 A tip of the hat to thank a member of the community for bringing the story to our attention.
🎦 A link to video content.

Leave a Reply

Your email address will not be published. Required fields are marked *

Scroll to top