26 September 2023

Getting Smart: Study clears Android apps of spying on users

Start the conversation

Catalin Cimpanu* says a large-scale study of Android apps has found no evidence to suggest they are secretly spying on device owners without their knowledge.


A thorough study of 17,260 Android apps reveals that while some apps may accidentally take screenshots of the user’s screen and upload it online, there is no evidence to suggest that apps are secretly turning a phone’s microphone or camera on to spy on device owners without their knowledge.

The study, carried out by academics from Northwestern University and the University of California, Santa Barbara, analysed the behaviour of popular apps available on the official Google Play Store and on three major third-party app stores.

The research team took a look at 15,627 apps from the official Google Play Store, 510 apps from AppChina, 528 apps from Mi.com, and 285 apps from the Anzhi portal.

Researchers analysed each app’s code and behaviour to detect:

  1. What and how many apps request permission to access a phone’s camera and microphone.
  2. Which apps include code that calls application programming interface (API) functions specific to multimedia collection (code that calls to the Audio API, the Camera API, or the Screen Capture API).
  3. And whether these API references (if they are present) are in code from the app’s developer or in a third-party library embedded inside the app.

Most apps hog permissions without using them

What researchers found was that a large number of apps request permissions to access multimedia resources in general, but only a small fraction actually call methods that use those permissions.

“This inconsistency increases the potential privacy risks for users: previously unused permissions could be exploited by new third-party code that a developer includes in an app,” researchers said.

“Further, third-party code that does not have permissions to use multimedia in one version of an app may start exploiting any permissions granted to a future version of the app for an unrelated purpose.”

But the good news is that from the 17,260 apps they analysed, the research team says it only found 21 that recorded and sent out multimedia data via their network connection.

Of these 21, 12 apps leaked data either by sending the information in plaintext (HTTP) or by coding errors that took screenshots of the user’s screen and uploaded it online.

The rest of the nine leaks are cases where the app uploaded images to cloud servers for editing purposes but did not specifically disclose this to users (still considered a leak).

All in all, the number of leaks is low in comparison with the analysed dataset, and researchers didn’t find any evidence of malicious behaviour, such as secretly recording audio via the microphone or video via the camera permission and then sneakily uploading it online.

Third-party libraries are where the danger is

But researchers do warn of other issues.

One of those is the increased use of third-party library code.

In their paper, the researchers say a lot of the risk comes mainly from third-party libraries, who often abuse the permission an app obtains from users.

“We find a previously unreported privacy risk from third-party libraries,” the researchers say.

“Namely, they can record the screen from the app in which they are embedded without requiring any permissions.”

“Apps often display sensitive information, so this exposes users to stealthy, undisclosed monitoring by third parties.”

The research team says it disclosed these leaks to the developers of the leaky apps, but also to the Android team, so Android developers can improve the OS design in regards to third-party libraries accessing features the mother app did not obtain permission for.

Researchers released their analysis’ bulk results on the Panoptispy website, which also hosts a copy of their research paper entitled, “Panoptispy: Characterising Audio and Video Exfiltration from Android Applications.”

* Catalin Cimpanu is the Security News Editor for Bleeping Computer. He tweets at @campuscodi.

This article first appeared at www.bleepingcomputer.com.

Start the conversation

Be among the first to get all the Public Sector and Defence news and views that matter.

Subscribe now and receive the latest news, delivered free to your inbox.

By submitting your email address you are agreeing to Region Group's terms and conditions and privacy policy.