Why does an Android keyboard need to see your camera and log files – and why does it phone home to China?
Better yet, why have 50m people downloaded it?
Updated Security biz Pentest is sounding alarms after it found an Android app it says has been downloaded 50 millions times despite being "little more than malware."
UK-based Pentest said a whitepaper study [PDF] of the popular Flash Keyboard found that the Android app is "abusing" OS permissions, inserting potentially malicious ads, and tracking user behavior, then sending data to servers in China.
"It is Pentest's opinion that this application was not written by the developers to be intentionally malicious," researchers said.
"However, through disregard for Android's development policy and a desire to monetize a free application, have created an application that deceives users, gathers personal information and obstructs uninstallation."
As its name would suggest, Flash Keyboard is a keyboard app for Android that supports multiple languages and describes itself as being "extremely adaptive to guarantee a fluent input in any situation." Pentest estimates that the app has been installed on more devices than WhatsApp.
Behind that popular keyboard tool, however, sit potentially serious privacy concerns. Pentest's researchers found in version 1.0.27 a laundry list of permissions requested by Flash Keyboard that the software would not appear to require to operate. Among those permissions were the ability to:
- Access the device's camera
- Post system alert messages, GPS and Wi-Fi location data
- Replace the default lock screen with one displaying advertisements
- Terminate background processes (such as antivirus tools)
Additionally, Pentest says, Flash Keyboard is collecting and transmitting user information including device manufacturer and model, IMEI (international mobile equipment identity) number, Wi-Fi and MAC data, Android version, and GPS coordinates to within one to three metres (3.3-9.8 feet). The data is being sent to servers in the US, the Netherlands, and China, where Pentest believes it is being used for analytics platforms.
While those services may not pose an immediate threat to user privacy, researchers worry that the excessive permissions and overzealous data collection could easily be used for nefarious purposes.
"In more sinister hands, this application could covertly download updates that weaponize the application; to exploit the granted privileges for mass or even targeted surveillance," Pentest researchers say.
The Register contacted Hong Kong-based developer DotC United, the developer of the app, for comment, but we have yet to receive a response. Pentest says it also attempted to contact them, to no avail.
Pentest said that while the Flash Keyboard app was taken down from the Play Store earlier this week, a similar keyboard written by the same developer has since taken its place. ®
Updated to add in August 2016
Our latest version of Flash Keyboard has no excessive permissions and never spies on user’s phone. “WIFI status” is to utilize the downloading strategy by detecting users’ network status, which is very helpful to optimize the user experience and save internet data cost.
As for “SMS message” permission, the data of SMS is only used locally without transmitting it to Chinese servers. The purpose of that is to improve the accuracy of word associations and predictions by obtaining the personalized information, which significantly helps improve the user experience.
“Device admin” and “geo-location” permissions are only for basic data analysis, more personalized functions and services can be provided to different users according to this analysis. And the abovementioned two methods are also been used in many popular application around the world. Last but most important, limited information transmitted to Chinese server is processed by a trustworthy third-party data analytic service “Mobile Tencent Analysis” (MTA) (similar to Google Analysis). This kind of data collection is acceptable and appropriate, and used commonly in this industry around the world.
Sponsored: Becoming a Pragmatic Security Leader