Add 'Static Analysis of The DeepSeek Android App'

master
Abbie Santo 2 months ago
parent 4cf993f2b1
commit 6c32e1422a

@ -0,0 +1,34 @@
<br>I performed a static analysis of DeepSeek, a Chinese LLM chatbot, utilizing version 1.8.0 from the [Google Play](https://duanju.meiwang360.com) Store. The [objective](https://dongphatcargo.com) was to identify potential [security](http://taxi-odesa-odessa-oblast-ua.taxigator.ru) and privacy problems.<br>
<br>I've [composed](https://thebattlefront.com) about [DeepSeek](http://djtina.blog.rs) formerly here.<br>
<br>Additional security and privacy about [DeepSeek](https://homnaythomo.com) have actually been raised.<br>
<br>See also this analysis by [NowSecure](https://back2music.net) of the iPhone version of DeepSeek<br>
<br>The [findings detailed](https://stopscientologydisconnection.com) in this report are based simply on [static analysis](https://niktalkmedia.com). This indicates that while the [code exists](https://steppingstoolint.org) within the app, there is no [conclusive proof](https://ocp.uohyd.ac.in) that all of it is carried out in practice. Nonetheless, [classifieds.ocala-news.com](https://classifieds.ocala-news.com/author/rhodafree0) the [presence](https://falecomkw.kepler.com.br) of such code warrants examination, specifically offered the [growing concerns](https://francispuno.com) around information [personal](https://manasvispecialists.com) privacy, monitoring, the prospective misuse of [AI](https://www.tennisxperience.nl)[-driven](https://hip-hop.id) applications, and [cyber-espionage dynamics](https://www.editions-ric.fr) in between [global powers](https://aliancasrei.com).<br>
<br>Key Findings<br>
<br>Suspicious Data Handling & Exfiltration<br>
<br>- Hardcoded URLs direct information to [external](https://jairodamiani.com.br) servers, raising issues about user [activity](http://expand-digitalcommerce.com) monitoring, such as to [ByteDance](https://designyourbrand.fr) "volce.com" [endpoints](http://lolabeancaking.com). [NowSecure identifies](https://vimpdesk.com) these in the [iPhone app](https://steevehamblin.com) the other day as well.
[- Bespoke](https://goodbear.co.za) encryption and information [obfuscation methods](http://s396607883.online.de) are present, with signs that they could be used to exfiltrate user [details](https://theedubook.com).
- The app contains hard-coded public secrets, instead of [depending](https://mtglegal.ae) on the user [gadget's](https://dev.ktaonline.inkindo.org) chain of trust.
- UI interaction tracking catches detailed user behavior without clear approval.
- WebView adjustment exists, which might allow for the app to gain access to [private external](http://different-kitchen.com) browser data when links are opened. More details about WebView controls is here<br>
<br>Device Fingerprinting & Tracking<br>
<br>A [substantial](http://git.jihengcc.cn) part of the examined code appears to focus on gathering device-specific details, which can be utilized for tracking and [fingerprinting](https://www.intercultural.ro).<br>
<br>- The app gathers numerous special gadget identifiers, consisting of UDID, Android ID, IMEI, IMSI, and [provider details](http://multi-net.su).
- System properties, set up bundles, and [root detection](http://123.60.173.133000) [systems recommend](https://www.godbeforegovernment.org) [potential anti-tampering](https://pro-saiding.ru) steps. E.g. probes for the [existence](https://yunatel.com) of Magisk, a tool that [privacy advocates](http://termexcell.sk) and security researchers utilize to root their Android devices.
- [Geolocation](https://www.mournium.de) and [network profiling](http://sportsight.org) are present, [indicating potential](http://wielandmedia.com) tracking abilities and [enabling](http://www.teni16.fr) or [disabling](http://alonsoguerrerowines.com) of fingerprinting regimes by area.
- Hardcoded device model lists recommend the application might act differently depending on the [discovered hardware](https://www.fightdynasty.com).
- Multiple vendor-specific services are utilized to extract additional gadget details. E.g. if it can not figure out the gadget through standard Android [SIM lookup](https://baskentklimaks.com) (because [consent](https://muse.union.edu) was not given), it tries producer specific [extensions](http://git.zthymaoyi.com) to access the very same details.<br>
<br>Potential Malware-Like Behavior<br>
<br>While no definitive conclusions can be drawn without vibrant analysis, [numerous observed](https://annualreport.ccj.org) [behaviors align](http://etvideosondemand.com) with known [spyware](http://khk.co.ir) and [malware](https://richiemitnickmusic.com) patterns:<br>
<br>- The app utilizes reflection and UI overlays, which could help with [unauthorized screen](http://drpritamshomeo.com) [capture](https://www.thetorturemuseum.it) or [phishing attacks](https://gitea.eggtech.net).
- [SIM card](https://hardnews.id) details, serial numbers, and other [device-specific](https://moeandco.com.au) information are aggregated for [it-viking.ch](http://it-viking.ch/index.php/User:Nellie6100) unknown functions.
- The [app implements](https://www.equipoalianza.com.ar) [country-based gain](https://itcabarique.com) access to constraints and "risk-device" detection, suggesting possible monitoring mechanisms.
- The app carries out calls to fill Dex modules, where [extra code](https://golocalclassified.com) is loaded from files with a.so extension at runtime.
- The.so [submits](https://www.elektrokamin-kaufen.de) themselves reverse and make additional calls to dlopen(), which can be utilized to [pack additional](https://www.npes.eu).so files. This facility is not [typically examined](https://hausarzt-schneider-spranger.de) by [Google Play](http://lolabeancaking.com) Protect and other fixed analysis services.
- The.so files can be carried out in native code, [bbarlock.com](https://bbarlock.com/index.php/User:LovieHacker002) such as C++. Using native code adds a layer of complexity to the [analysis process](http://martapulman.blog.rs) and obscures the complete extent of the [app's abilities](http://backyarddesign.se). Moreover, [angevinepromotions.com](https://www.angevinepromotions.com/deepseek-r1-model-now-available-in-amazon-bedrock-marketplace-and-amazon-sagemaker-jumpstart/) native code can be [leveraged](https://zeroowastelifestyle.com) to more quickly [escalate](https://butterflygardensabudhabi.com) privileges, potentially exploiting vulnerabilities within the os or [wiki.snooze-hotelsoftware.de](https://wiki.snooze-hotelsoftware.de/index.php?title=Benutzer:JavierBidwill) gadget hardware.<br>
<br>Remarks<br>
<br>While data collection prevails in [modern applications](https://muse.union.edu) for [debugging](http://sandkorn.st) and [improving](http://centazzolorenza.it) user experience, aggressive fingerprinting raises substantial personal privacy issues. The [DeepSeek app](https://bikexplore.ro) requires users to log in with a [legitimate](http://nbhaiqiang.com) email, which ought to already provide adequate [authentication](http://ungov.pl). There is no [legitimate reason](https://pizzeriaviktoria.sk) for the app to strongly collect and [transmit distinct](http://macway.commander1.com) gadget identifiers, IMEI numbers, [SIM card](https://www.primaria-viisoara.ro) details, and other [non-resettable](https://teachersconsultancy.com) system homes.<br>
<br>The extent of tracking observed here [exceeds](http://esk-cityfinanz.de) normal analytics practices, potentially making it possible for [persistent](https://tsagdis.com) user [tracking](https://www.npes.eu) and re-identification across devices. These behaviors, combined with obfuscation strategies and network communication with third-party tracking services, call for a higher level of examination from [security scientists](http://www.prettyorganized.nl) and users alike.<br>
<br>The work of runtime code [packing](https://www.jopilatesstudio.co.uk) as well as the bundling of [native code](https://playa.elbocaitoguardamar.com) [recommends](http://1c-cab.ru) that the app might allow the deployment and execution of unreviewed, from another location provided code. This is a severe possible attack vector. No proof in this report is provided that from another location released [code execution](https://verttige-saintbenoit.fr) is being done, only that the center for [forum.pinoo.com.tr](http://forum.pinoo.com.tr/profile.php?id=1317385) this [appears](https://www.sportpassionhub.com) present.<br>
<br>Additionally, the app's method to finding rooted gadgets [appears extreme](https://elsingoteo.com) for an [AI](https://france.scalerentals.show) chatbot. Root detection is [frequently](https://www.univ-chlef.dz) warranted in DRM-protected streaming services, where security and content security are crucial, or in [competitive](https://a1drivingschoolnj.com) computer game to prevent unfaithful. However, there is no clear [rationale](http://zwergenland-kindertagespflege.de) for such strict measures in an application of this nature, raising further [concerns](http://103.254.32.77) about its intent.<br>
<br>Users and [tandme.co.uk](https://tandme.co.uk/author/rubyeparkhi/) organizations thinking about [setting](http://1c-cab.ru) up DeepSeek should know these potential dangers. If this application is being [utilized](https://skyblue.wiki) within an [enterprise](http://www.microresolutionsforweightloss.com) or [government](https://vimpdesk.com) environment, extra vetting and security controls ought to be imposed before permitting its [implementation](https://www.selfdrivesuganda.com) on [handled devices](https://westsuburbangriefmn.org).<br>
<br>Disclaimer: The [analysis](http://khk.co.ir) presented in this report is based on static code [evaluation](https://nomadtech.fr) and does not imply that all detected functions are actively used. Further [investigation](https://promobolsas.es) is [required](http://www.gravogl.at) for definitive conclusions.<br>
Loading…
Cancel
Save