2 min read

Instead of Football Matches, Apps Play Unauthorized Code

Loredana BOTEZATU

April 09, 2014

Instead of Football Matches, Apps Play Unauthorized Code

The highly anticipated World Cup 2014 may turn hazardous for smartphone-wielding fans, according to Bitdefender findings. FIFA World Cup 2014 Live Match, a free app from Google Play, could download and run unverified code, despite stating it allows fans watch live football matches by providing a series of hyperlinks.

Allowing an app to download and run code at will is like signing a check in blank and the handset owner might end up a victim of a man-in-the-middle attack where someone intercepts and pushes, for instance, a possibly malicious update. All it takes is a vulnerable Widdit version and an unsecure wireless Internet connection.

A vulnerable Widdit SDK ” an advertising framework – allows a JAR file be downloaded via HTTP (unencrypted) and doesn`t do any security or integrity checks within the downloader to make sure the data was not manipulated on the way.

Additionally, FIFA World Cup 2014 Live Match requests the permission to track the location of the handset and leaks the unique device identifier. According to the app permission set, it may also intercept text or multimedia messages received by the device owner, read the browsing history and the contact list. While many apps have a legitimate need to see contacts, this one doesn`t.

Android users are advised to exercise extreme caution when installing apps and to thoroughly check the app requirements. Installing a mobile security solution such as Bitdefender Mobile Security, which detects virulent adware, helps users keep their data secure. Bitdefender also recommends Clueful for Android, a free app that offers an expert opinion on how apps on your handset treat your privacy.

This article is based on the technical information provided courtesy of Bitdefender Clueful Team.

Note: All product and company names mentioned herein are for identification purposes only and are the property of, and may be trademarks of, their respective owners.

tags


Author



Right now

Top posts

Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

July 16, 2021

3 min read
How to protect yourself against cyberstalking

How to protect yourself against cyberstalking

July 06, 2021

2 min read
The Top Five Security Risks Smartphone Users Face Today

The Top Five Security Risks Smartphone Users Face Today

July 02, 2021

4 min read
Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

July 02, 2021

3 min read
Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

June 30, 2021

2 min read
Mobile security threats: reality or myth?

Mobile security threats: reality or myth?

June 13, 2021

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Fraud Family cybercrime ring under the spotlight as arrests made in the Netherlands Fraud Family cybercrime ring under the spotlight as arrests made in the Netherlands
Graham CLULEY

July 23, 2021

3 min read
Homoglyph domains used in BEC scams shut down by Microsoft Homoglyph domains used in BEC scams shut down by Microsoft
Graham CLULEY

July 22, 2021

3 min read
China Sets Up New Worrying Vulnerability Disclosure Rules China Sets Up New Worrying Vulnerability Disclosure Rules
Silviu STAHIE

July 20, 2021

1 min read