Home Security ADUPS reach much greater than reported, companies named
ADUPS reach much greater than reported, companies named Featured

A total of 43 Android phone makers, not three as originally reported, have been caught using ADUPS software to collect personally identifiable information without consent.

iTWire reported the original story and stated that the two of companies originally mentioned had responded:

  • ZTE: No handsets sold in the US have ADUPS (it did not mention other regions).
  • Huawei: It takes its customers' privacy and security seriously, and it works diligently to safeguard that privacy and security. It said that ADUPS was not on its list of approved suppliers, and it had never conducted business with it.

Trustlook,  one of the companies that discovered the ADUPS software, was not entirely happy and has done a lot more work, eventually identifying 43 offending companies. While the majority are China-based some do ship their own or white labelled phones to other markets. And in doing so, it also identified more than 91 variants of com.adups.fota and com.adups.fota.sysoper. This casts serious doubt on the following statement from ADUPS.

ADUPS maintains the software (firmware updater) was written long ago at the request of an unidentified Chinese manufacturer that wanted the ability to store call logs, text messages, and other data for customer support. “Adups is just there to provide functionality that the phone distributor asked for,” said Lily Lim, a lawyer in Palo Alto, California, who represents ADUPS.

The manufacturers with devices that contain ADUPS technology are

  • Aaron Electronics
  • Aeon Mobile
  • All Win Tech
  • Amoi Technology
  • Archos
  • AUX
  • Bird
  • BLU
  • Cellon
  • Coship Mobile
  • DEWAV Communication Group
  • DEXP Digital Experience
  • Eastaeon Technology
  • Electronic Technology Co.
  • Gionee
  • GOSO
  • Hisense
  • Hongyu
  • Huaqin
  • Huiye
  • Inventec Corporation
  • Konka Group Co
  • Lenovo
  • Logicom
  • Longcheer
  • Malata Mobile
  • Mediatek (Helio)
  • Prestigio
  • Ragentek
  • RDA Micro
  • Reallytek
  • RUIO
  • Sanmu
  • Sprocomm
  • Tinno
  • Uniscope
  • VSUN
  • Water World Technology Co.
  • Wind Communication
  • WingTech
  • Yifang Digital
  • Zhuhai Quanzhi
  • ZTE

Trustlook has updated its mobile security app to check for all known versions of the ADUPS apps. More versions are being added as they are discovered. The Trustlook Mobile Security app is available on Google Play. Trustlook has also assembled all the detailed ADUPS information on this resource page, including the identifier (MD5) of 91 additional affected versions of com.adups.fota and com.adups.fota.sysoper.

ADUPS 1

ADUPS 2

ADUPS 3

 

47 REASONS TO ATTEND YOW! 2018

With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

· Sydney 29-30 November
· Brisbane 3-4 December
· Melbourne 6-7 December

Register now for YOW! Workshops

· Sydney 27-28 November
· Melbourne 4-5 December

REGISTER NOW!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Ray Shaw

joomla stats

Ray Shaw ray@im.com.au  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect