Shopping app Temu is “dangerous malware,” spying on your texts, lawsuit claims

https://lemm.ee/post/35673698

Shopping app Temu is “dangerous malware,” spying on your texts, lawsuit claims - lemm.ee

Temu is absolute cancer in terms of business practices so no surprise here at all.
Cancer in terms of, well, everything.
But it’s cheap.
If I wanted garbage I could get it for free from the roadside
Why is Temu so popular then?
Because people get dopamine from shopping, even if it’s garbage. It causes enormous amounts of waste, because most of the crap isn’t used much if at all. They just make it look good on the product page.

Shocked i tell you. I am shocked.

No way an app would collect data it doesnt need. Preposterous.

Next thing you’ll tell me is that tiktok is doing the same thing!

What about Meta and Google?
Them too, but lukewarm by comparison.
Why do you say that?
Cause they are owned by American billionaires and as such are more ethical. /s
Like Tim Apple, iPodJockey?
I was given this nickname by an old guy at work that knew I was good with computers. Never actually owned an ipod lol.

Emphasis on by comparison, as in “molten hot metal is cooler than the surface of the sun, by comparison”.

TikTok and Temu actively have code in them that would be considered a virus in other contexts. They exploit your system to gain more access than they should, violating the point of sandboxed access.

By comparison Meta and Google merely take advantage of user ignorance and apathy by making opting out frustrating - but still technically doable.

Both practices are terrible, but that’s not the same as saying they’re equally bad.

By comparison Meta and Google merely take advantage of user ignorance and apathy by making opting out frustrating - but still technically doable.

This is simply just not true. Meta used an adversary-in-the-middle attack to decrypt Snapchat and other competitors traffic. Facebook, Apple, Twitter and Google have been intercepting traffic since before https/sandbox/anti-virus were the norm. Do you think they didn’t do anything malicious?

Install any Google app on Windows and it will install a task schedule and a always online background service to “check for updates” and downloads and runs their executable without any user consent. I wonder why no body had a problem with that. hmm…

malwarebytes.com/…/facebook-spied-on-snapchat-use…

Google runs it own operating system so they could technically do anything they so fucking please. You think Chinese Android variants are using exploits or just scooping data wholesale, because it can. But you think Google and Apple aren’t?

It’s showing your prejudice, bias and concern trolling more than anything.

Facebook spied on Snapchat users to get analytics about the competition | Malwarebytes

Facebook is accused of using potentially criminal methods to spy on Snapchat users to gain a commercial advantage over its competition.

Malwarebytes

Erm, WhatsApp would suggest otherwise.

WhatsApp was the vector for zero click access to a target’s phone from Israel’s weapons grade hacking Pegasus toolkit. They would send a video call, typically in the middle of the night, and with no input from the used they’d get full access. My personal belief is that they used functionality WhatsApp itself uses to access user data.

There was also an encrypted phone called ANOM, which had this trick calculator app with a hidden encrypted messager. “Made for criminals, by criminals”. Except, when the guy started his business he got investment from the FBI and Australian Federal Police to pay for the servers and some of the phones themselves. Basically every time it sent an encrypted message it sent a separate encrypted message to the ANOM servers. It’s entirely possible (perhaps even likely) that WhatsApp would do this also.

As for Google, they’re truly insidious. Lots of banks now require you to connect to Google captcha servers - they don’t give you the pictures, it’s just the back end, basically the tracking parts. Then there’s the controversy about them collecting location data when users have said no. They absolutely do collect data they shouldn’t.

I’ll accept that maybe I’m giving Google a pass because of misplaced nostalgia, and while I personally have never used or liked Meta Facebook, I’ll concede that for a while it provided a service some people valued.

It’s still my opinion that Google and Facebook have a large percentage of engineers that personally try to make them a genuinely good service, at least moreso than compared to TikTok and Temu. But I’m willing to concede it’s not as much a practical difference as I would like.

It’s still my opinion that Google and Facebook have a large percentage of engineers that personally try to make them a genuinely good service

Most of those people were sacked long ago. Today’s menu for those that remained is shareholder maximum value extraction sausage fest

it doesn’t count when it’s an american company doing it

“Temu is designed to make this expansive access undetected, even by sophisticated users,” Griffin’s complaint said. “Once installed, Temu can recompile itself and change properties, including overriding the data privacy settings users believe they have in place.”

That’s just nuts

Shits getting scarier by the day.

This is why companies like Apple are at least a tiny bit correct when they go on about app security and limiting code execution. The fact it aligns with their creed of controlling all of the technology they sell makes the whole debate a mess, though. And it does not excuse shitty behavior on their part.

But damn

And if they got this past Apple in their platforms. That’s even wilder.

The article linked to the analysis and on a quick glance, it seems to be done entirely against the Android variant of the app. This makes sense because if the alleged actions are true, they’d never have gotten on to the App Store for iOS Apple users… or at least as of a couple months ago. Who knows what kind of vulnerability is exposed by Apple only doing limited cursory checks for 3rd party App Stores.

Yeah, it is. It’s such an extraordinary claim.

One requiring extraordinary evidence that wasn’t provided.

You’re bang on the money.

If even half of what this article is suggesting were true, why wouldn’t Temu use their 1337 hacker skills to steal money outright rather than disguising it as a shopping app?

I don’t believe his claims without evidence, but having a legit cover for nefarious acts is pretty standard, no?
I guess, but what I was trying to get at is that the claims they’re making are so fantastical that the cover wouldn’t be necessary.
Why steal their money when they can both get them to give their money as well data to also sell?

Libmanwe-lib.so is a library file in machine language (compiled). A Google search reveals that it is exclusively mentioned in the context of PDD software—all five search results refer to PDD’s apps. According to this discussion on GitHub, “the malicious code of PDD is protected by two sets of VMPs (manwe, nvwa)”. Libmanwe is the library to use manwe.

An anonymous user uploaded a decompiled version of libmanwe-lib to GitHub. It reads like it is a list of methods to encrypt, decrypt or shift integer signals, which fits the above description as a VMP for the sake of hiding a program’s purpose.

In plain words, TEMU’s app employed a PDD proprietary measure to hide malicious code in an opaque bubble within the application’s executables

So wait, bit-shifting some integers is now considered being malicious? Is that really the defense here? Using that definition just about all software in existence is malicious.

Bit shifting is not malicious on its own. Bit shifting to specifically conceal the purpose of your policy violating code from the auditors who audit the apps submitted to the App Store is malicious.

It’s about why you are doing it and what you are doing with it and not that it’s bit shifting on it’s own.

Temu can recompile itself

I don’t think the author knows what “compile” means when it comes to software.

  • Dynamic compilation using runtime.exec(). A cryptically named function in the source code calls for “package compile”, using runtime.exec(). This means a new program is created by the app itself.—Compiling is the process of creating a computer executable from a human-readable code. The executable created by this function is not visible to security scans before or during installation of the app, or even with elaborate penetration testing. Therefore, TEMU’s app could have passed all the tests for approval into Google’s Play Store, despite having an open door built in for an unbounded use of exploitative methods. The local compilation even allows the software to make use of other data on the device that itself could have been created dynamically and with information from TEMU’s servers.
  • Ah yes, delete your original incorrect comment instead of continuing the discussion about how wrong and lazy it was to make, nice.
    Have they ever heard of faceberg or sundar the creep?

    I am not even remotely surprised.

    Every day I hear a story about Chinese software being spyware.

    Shop like a billionaire targeted by state sponsored hackers.

    I’m sure Temu collects all information you put into the app and your behaviour in it, but this guy is making some very bold claims about things that just aren’t possible unless Temu is packing some serious 0-days.

    For example he says the app is collecting your fingerprint data. How would that even happen? Apps don’t have access to fingerprint data, because the operating system just reports to the app “a valid fingerprint was scanned” or “an unknown fingerprint was scanned”, and the actual fingerprint never goes anywhere. Is Temu doing an undetected root/jailbreak, then installing custom drivers for the fingerprint sensor to change how it works?

    And this is just one claim. It’s just full of bullshit. To do everything listed there it would have to do multiple major exploits that are on state-actor level and wouldn’t be wasted on such trivial purpose. Because now that’s it’s “revealed”, Google and Apple would patch them immediately.

    But there is nothing to patch, because most of the claims here are just bullshit, with no technical proof whatsoever.

    Yeah, I don’t like Temu, and I’m sure the app is a privacy nightmare, but these claims don’t seem right. If it’s true, I’m like to see someone else verify it.

    The study and evidence was already provided months ago

    grizzlyreports.com/we-believe-pdd-is-a-dying-frau…

    This was also linked in the article if you read it

    Here’s the actual relevant part:

    These are security risks to be sure, and while these permissions are (mostly) on the surface, possibly defensible, together they do clearly represent an app trying to gather all of the data that it can.

    However, a lot of info from this report is overblown. For example code compilation is sketchy to be sure, but without a privilege escalation attack, it can’t do anything the app couldn’t do with an update.

    Also, there’s some weird language in the report, like counting the green security issues in other apps (like tiktok) as if they were also a problem, despite the image showing that green here means it doesn’t present that particular risk.

    All of this to say, if you have temu, probably uninstall it. It’s clearly collecting all the data it can get.

    But it’s unlikely to be the immediate threat that will have China taking over your phone like this report implies.

    Thanks, that brings done useful context here
    This infographic is really helpful. Stuff like this makes me relieved I use the majority of services in a browser, rather than native apps
    Exactly why I use browser and not apps, too. and if they try to strongarm me with better prices or degraded services, I just stop using them all together.
    Yup. I used to watch TikTok’s sent to me. Now I can’t. They want me to use their app. LOL. Nah.
    It’s why I stopped using Reddit on mobile lol. No, I don’t want to download your official app, and no you making it so I need it to access NSFW stuff will convince me to.
    I’m blown away by how many people use apps when they don’t have to. There’s a reason companies are always trying to get you to download their app, and it’s so they can put their software on your phone and harvest more of your data.

    That… is not a study by anyone who knows what they are talking about. It also does not mention fingerprints at all.

    They seem to believe that the app can use permissions undeclared in the manifest file because they obviously think it’s only for the store to show the permissions to the user. Android will not actually allow an app to use undeclared permissions. The most rational explanation is the codebase is shared with different version of the app (possibly not released) that had different manifests.

    It also makes a big deal of checking if running as root. That is not evidence of having an escalation exploit. If they have an ability to get root before running the app why would they need to use the app to exploit it? They could just do whatever they wanted and avoid leaving traces in the app. Though I doubt they would root phones to just brick them. It’s the kind of mischief you would expect from a kid writing viruses, not an intelligence agency or criminal enterprise.

    Users who root their own phones are very unlikely to run temu as root. In fact a lot of apps related to shopping or banking try to detect root to refuse to work as your system is unsafely. In any case it’s a very niche group to target.

    To keep things short, that ‘study’ does not really look credible or written by actual experts.

    Haven’t read the article because I’m not interested in an app I don’t use, but does it mean browser fingerprint? Because that’s slang for the fonts/cookies/user-data of your browser, and lots of apps have access to that.

    The analysis shows it’s spyware, which I don’t question. But it’s spyware in the bounds of Android security, doesn’t hack anything, doesn’t have access to anything it shouldn’t, and uses normal Android permissions that you have to grant for it to have access to the data.

    For example the article mentions it’s making screenshots, but doesn’t mention that it’s only screenshots of itself. It can never see your other apps or access any of your data outside of it that you didn’t give it permission to access.

    Don’t get me wrong, it’s very bad and seems to siphon off any data it can get it’s hands on. But it doesn’t bypass any security.

    I agree on the sensationalism in the article.
    Still sounds like shitty company doing shitty things
    That is not entirely correct. The reported found the app using permissions that are not covered by the manifest. It also found the app being capable to execute arbitrary code send by temu. So it cannot be clearly answered if the app can utilize these permissions or not. Obviously they would not ship such an exploit with the app directly.

    The reported found the app using permissions that are not covered by the manifest.

    It didn’t found them using them, it’s an important distinction. It found code referring to permissions that are not covered by the Manifest file. If that code was ran, the app would crash, because Android won’t let an app request and use a permission not in the Manifest file. The Manifest file is not an informational overview, it’s the mechanism through which apps can declare permissions that they want Android to allow them to request. If it’s not in the Manifest, then it’s not possible to use. It’s not unusual to have a bunch of libraries in an app that have functionality you don’t use, and so don’t declare the required permissions in the Manifest, because you don’t use them.

    It also found the app being capable to execute arbitrary code send by temu.

    Yeah, which is shady, but again, there is nothing to indicate that code can go around any security and do any of the sensational things the article claims.

    The Grizzly reports shows how the app tricks you into granting permissions that it shouldn’t need, very shady stuff. But it also shows they don’t have a magical way of going around the permissions. The user has to actually grant them.

    Do you know if there people who have gone this far analysing the TikTok and WeChat apps?
    Wouldn’t the phone have to have your fingerprint stored in order to compare it to the one scanned?