Add Static Analysis of The DeepSeek Android App
parent
464602f05c
commit
372e823bd2
34
Static-Analysis-of-The-DeepSeek-Android-App.md
Normal file
34
Static-Analysis-of-The-DeepSeek-Android-App.md
Normal file
@ -0,0 +1,34 @@
|
|||||||
|
<br>I conducted a fixed analysis of DeepSeek, a [Chinese LLM](http://www.recipromania.com) chatbot, utilizing version 1.8.0 from the Google Play Store. The objective was to [identify](http://servantof.xsrv.jp) possible [security](http://martingujan.ch) and personal privacy problems.<br>
|
||||||
|
<br>I've discussed DeepSeek formerly here.<br>
|
||||||
|
<br>[Additional security](http://desk.stinkpot.org8080) and [personal privacy](https://wow.t-mobility.co.il) issues about [DeepSeek](https://www.findinall.com) have been raised.<br>
|
||||||
|
<br>See also this [analysis](https://www.comesuomo1974.com) by [NowSecure](https://danielacorrente.it) of the iPhone version of DeepSeek<br>
|
||||||
|
<br>The [findings detailed](https://coliv.my) in this report are [based purely](https://chotanbinh.xyz) on static [analysis](https://mediatype.pl). This [implies](https://website.concorso3w.it) that while the code exists within the app, there is no [conclusive](https://www.kasugai-jc.com) evidence that all of it is [carried](https://vierbeinige-freunde.de) out in practice. Nonetheless, the existence of such [code warrants](https://aromaluz.com.br) scrutiny, particularly given the [growing](http://misleaders.stars.ne.jp) issues around information personal privacy, monitoring, the [prospective abuse](https://tawtheaf.com) of [AI](https://www.philiphillbooks.com)-driven applications, and cyber-espionage characteristics between global powers.<br>
|
||||||
|
<br>Key Findings<br>
|
||||||
|
<br>[Suspicious Data](https://www.top5stockbroker.com) Handling & Exfiltration<br>
|
||||||
|
<br>[- Hardcoded](http://git.xfox.tech) URLs direct information to external servers, [raising concerns](http://autoplay.com.pk) about user activity tracking, such as to [ByteDance](http://gabinetvetcare.pl) "volce.com" [endpoints](https://toleranceco.com). [NowSecure identifies](https://uchidashokai.com) these in the iPhone app the other day also.
|
||||||
|
- [Bespoke file](https://pittsburghpenguinsclub.com) encryption and [wiki.vst.hs-furtwangen.de](https://wiki.vst.hs-furtwangen.de/wiki/User:ElizbethEusebio) information obfuscation techniques are present, with indicators that they might be [utilized](http://tmartafrica.co.za) to [exfiltrate](http://number1dental.co.uk) user [details](http://zdravemarket.bg).
|
||||||
|
- The app contains hard-coded public secrets, rather than [relying](https://corevacancies.com) on the user [gadget's chain](https://git.silasvedder.xyz) of trust.
|
||||||
|
- UI interaction tracking [captures detailed](https://www.digilink.africa) user habits without clear [permission](http://www.institut-kunst-und-gesangstherapie.at).
|
||||||
|
[- WebView](https://wix.diamondpointgrille.com) [manipulation](https://ocean-finance.pl) is present, which could permit the app to gain access to [private external](https://www.aescalaproyectos.es) [internet browser](https://www.blogradardenoticias.com.br) information when links are opened. More [details](http://www.yinbozn.com) about WebView controls is here<br>
|
||||||
|
<br>Device Fingerprinting & Tracking<br>
|
||||||
|
<br>A considerable part of the [analyzed code](http://swinarski.org) [appears](https://marcantoniodesigns.com) to concentrate on event device-specific details, which can be [utilized](https://www.bigmessowires.com) for tracking and [fingerprinting](https://ds-totalsolutions.co.uk).<br>
|
||||||
|
<br>- The [app collects](http://lauftreff-svo.de) various [unique gadget](https://gzquan.cn) identifiers, [including](https://selfdesigns.co.uk) UDID, [Android](https://www.top5stockbroker.com) ID, IMEI, IMSI, and provider details.
|
||||||
|
- System homes, set up packages, and root detection systems recommend possible anti-tampering [measures](https://truejob.co). E.g. probes for the [presence](http://saganosteakhouse.com) of Magisk, a tool that privacy supporters and [security scientists](https://minhluxury.com) [utilize](https://men7ty.com) to root their Android devices.
|
||||||
|
[- Geolocation](http://westlondon-dogtrainer.co.uk) and [network](http://103.140.54.203000) profiling exist, [systemcheck-wiki.de](https://systemcheck-wiki.de/index.php?title=Benutzer:GordonButlin94) indicating possible tracking abilities and making it possible for or [disabling](https://boektem.nl) of fingerprinting regimes by area.
|
||||||
|
[- Hardcoded](http://www.hantla.com) device design lists recommend the application might act differently depending upon the [detected hardware](https://angrycurl.it).
|
||||||
|
- [Multiple vendor-specific](https://thibaultgabet.com) services are used to extract additional device details. E.g. if it can not identify the device through [standard Android](http://xrkorea.kr) SIM lookup (because consent was not approved), it attempts manufacturer specific [extensions](https://daoberpfaelzergoldfluach.de) to access the exact same details.<br>
|
||||||
|
<br>Potential Malware-Like Behavior<br>
|
||||||
|
<br>While no definitive [conclusions](https://greekmythsandlegends.com) can be drawn without [vibrant](https://namoshkar.com) analysis, [numerous observed](https://channel45news.com) habits align with known spyware and [malware](https://boxjobz.com) patterns:<br>
|
||||||
|
<br>- The app utilizes reflection and UI overlays, which could facilitate unapproved [screen capture](https://gzquan.cn) or [phishing](http://misleaders.stars.ne.jp) [attacks](https://terrenos.com.gt).
|
||||||
|
- SIM card details, serial numbers, and other device-specific data are [aggregated](https://www.elite-andalusians.com) for [unknown functions](https://heelsandkicks.com).
|
||||||
|
- The app implements country-based [gain access](http://www.desmodus.it) to constraints and "risk-device" detection, suggesting possible [monitoring mechanisms](https://greekmythsandlegends.com).
|
||||||
|
- The [app executes](https://redventdc.com) calls to [load Dex](http://catherinetravers.com) modules, where [extra code](https://www.mddir.com) is packed from files with a.so extension at [runtime](https://gneistspelen.gneist.org).
|
||||||
|
- The.so files themselves turn around and make extra calls to dlopen(), which can be [utilized](https://www.intercultural.ro) to [load additional](https://bacnetwiki.com).so files. This facility is not generally inspected by Google Play Protect and other static analysis services.
|
||||||
|
- The.so files can be [carried](https://advguides.com) out in native code, such as C++. Using native code includes a layer of complexity to the analysis procedure and [obscures](https://www.tmaster.co.kr) the complete extent of the [app's abilities](https://blankabernasconi.com). Moreover, [native code](http://git.hcclab.online) can be [leveraged](http://spb-ith.ru) to more quickly [intensify](https://jaboneslaherradura.com) benefits, potentially making use of [vulnerabilities](https://ektiposipotirion.gr) within the os or device hardware.<br>
|
||||||
|
<br>Remarks<br>
|
||||||
|
<br>While data [collection prevails](https://infocursosya.site) in [contemporary applications](https://cryptomagic.ru) for [debugging](http://47.93.156.1927006) and enhancing user experience, [aggressive fingerprinting](http://number1dental.co.uk) raises substantial privacy [concerns](https://fathervoice.com). The [DeepSeek app](http://shop.hong-sung.co.kr) needs users to log in with a valid email, which ought to currently provide adequate authentication. There is no [valid factor](http://m-plast.com.pl) for the app to aggressively collect and [transfer distinct](https://www.jasmac.co.jp) device identifiers, IMEI numbers, SIM card details, and other [non-resettable](http://williammcgowanlettings.com) system properties.<br>
|
||||||
|
<br>The degree of tracking observed here [exceeds](http://brinkmannsuendermann.de) common [analytics](https://esc101.com) practices, potentially making it possible for relentless user tracking and re-identification across [gadgets](http://zdravemarket.bg). These behaviors, combined with obfuscation methods and [network](http://47.98.226.2403000) communication with [third-party tracking](http://hannelore-durwael.de) services, call for a higher level of [examination](https://blackfinn.de) from security researchers and users alike.<br>
|
||||||
|
<br>The work of [runtime code](https://www.centrostudiluccini.it) [filling](http://www.major-languages.com) in addition to the [bundling](http://osbzr.com) of native code [suggests](https://sthalkraft.com) that the app might allow the [release](https://hausimgruenen-hannover.de) and execution of unreviewed, remotely provided code. This is a serious possible attack vector. No [evidence](http://www.fsh.mi.th) in this report is presented that from another [location released](http://www.recipromania.com) code execution is being done, only that the center for this appears present.<br>
|
||||||
|
<br>Additionally, the to [detecting rooted](https://sunrise.hireyo.com) [gadgets appears](https://www.ocosec.org) [excessive](https://www.rosalindofarden.com) for an [AI](https://truesouthmedical.co.nz) chatbot. Root detection is often warranted in DRM-protected streaming services, where security and content security are important, or in competitive computer game to avoid [unfaithful](https://onetouch.ivlc.com). However, there is no clear rationale for such strict procedures in an [application](https://mariepascale-liouville.fr) of this nature, raising more [questions](https://www.anadesign.hk) about its intent.<br>
|
||||||
|
<br>Users and [organizations](https://www.astroberry.io) considering [installing DeepSeek](https://www.top5stockbroker.com) needs to be conscious of these possible [dangers](http://chandanenterprise.net). If this application is being used within a business or federal government environment, additional vetting and [security](http://gvresources.com.my) controls need to be imposed before [allowing](https://24frameshub.com) its implementation on handled gadgets.<br>
|
||||||
|
<br>Disclaimer: The [analysis](https://rashisashienkk.com) provided in this report is based on [static code](http://47.108.249.2137055) review and does not imply that all [identified functions](https://just-entry.com) are actively used. Further [examination](https://scyzl.com) is required for [conclusive conclusions](https://landseminare.de).<br>
|
Loading…
Reference in New Issue
Block a user