Security

Keyboard app flaws expose almost one billion to network threats

New research reveals vulnerabilities in popular Chinese-language keyboard apps leave users exposed.

Almost all apps used around the world to enter Chinese-language characters into mobile devices share a security weakness that enables the capture of keystroke data, potentially exposing nearly one billion users to surveillance and exploitation by adversaries.

Researchers at Toronto University’s Citizen Lab have found critical security vulnerabilities in the keyboard apps of Baidu, Honor, iFLYTEK, OPPO, Samsung, Tencent, VIVO and Xiaomi. Of the nine vendors examined, only Huawei was found not to pose security issues.

The flaws uncovered reveal how apps that transmit users’ keystrokes can render data such as login inputs (usernames and passwords), financial information, and messages that are otherwise end-to-end encrypted vulnerable to capture and exploitation by state surveillance groups and cybercriminals.

The recent analysis adds to findings released in August 2023 by Citizen Lab. At that time, researchers found the Sougou Input Method keyboard software made by Tencent, the most popular input method in China, did not utilize Transport Layer Security (TLS) when transmitting keystroke data to its cloud server to improve on predictive accuracy when typing. The widely adopted TLS cryptographic protocol is designed to provide communications security over computer networks and is utilized in applications such as email, instant messaging and voice over IP (VoIP), as well as to secure HTTPS (Hypertext Transfer Protocol Secure) connections for websites. The vulnerabilities exposed revealed third-parties with privileged network positions (such as ISP or anyone with access to upstream routers) could read texts and users’ inputs on devices in real-time as information was typed.

In their latest study, Citizen Lab notes:

Citizen Lab recommends urgent updates and user awareness to protect against keystroke leakage, including the following safeguards:

  • Users of Sogou, QQ, Baidu, and iFLYTEK input methods, regardless of whether the input method is installed from the app store or manually installed on the operating system, should ensure that the input method and operating system are maintained in the latest version.
  • Privacy-conscious users should discontinue the cloud functionality in any input method.
  • Privacy-conscious iOS users should not give the input method the permission to “allow full access”.

To read the Citizen Lab press release on their cybersecurity report, “The not-so-silent type: Vulnerabilities across keyboard apps reveal keystrokes to network eavesdroppers,” go directly to their website here.

The full report in a PDF format is available below.

See the publisher’s website here for the original version of this report.

Leave a comment