Kuboid
Open Luck·Kuboid.in

EFF Panel: Surveillance, Privacy, and Security

DEFCONConference190 views48:356 months ago

This panel discussion explores the intersection of surveillance, privacy, and security, focusing on the role of Electronic Frontier Foundation (EFF) projects in protecting vulnerable populations. The speakers discuss the impact of stalkerware, spyware, and data brokers on privacy, and how tools like Certbot, Privacy Badger, and Ray Hunter are used to mitigate these threats. The talk emphasizes the importance of community-driven security research and the need for comprehensive data privacy legislation to address systemic issues.

Beyond the Hype: Why Your Mobile Security Stack is Leaking Data

TLDR: This panel from DEF CON 2025 highlights how low-budget Android devices and poorly secured mobile applications are creating massive privacy gaps for vulnerable populations. By reverse-engineering pre-installed spyware and analyzing network traffic, researchers are uncovering how these devices exfiltrate sensitive data without user consent. Pentesters should prioritize auditing pre-installed applications and monitoring outbound traffic on low-cost hardware to identify these systemic exfiltration points.

Security researchers often focus on high-profile targets, but the most pervasive threats to privacy are frequently found in the commodity hardware used by the most vulnerable. The recent panel discussion at DEF CON 2025 regarding the Electronic Frontier Foundation’s work on mobile security serves as a stark reminder that the biggest risks are often hidden in plain sight. When we talk about mobile security, we usually default to discussing OS-level vulnerabilities or sophisticated zero-click exploits. However, the real-world risk for many users is far more mundane: pre-installed spyware and stalkerware that bypasses standard security controls.

The Mechanics of Commodity Spyware

The research presented focused on the prevalence of stalkerware and spyware on low-budget Android devices. Unlike traditional malware that a user might accidentally download, this software is often baked into the firmware or pre-installed by the manufacturer. These applications operate with elevated privileges, allowing them to harvest location data, SMS messages, and call logs with minimal friction.

From a technical perspective, the exfiltration flow is straightforward. These applications often use hardcoded C2 (Command and Control) servers to push harvested data. During the investigation, researchers identified that these applications frequently lack basic obfuscation, making them prime targets for static analysis. If you are performing a mobile assessment, you should be looking for applications that request broad permissions—specifically those related to accessibility services or device administration—that do not align with the application's stated purpose.

Analyzing Exfiltration Patterns

One of the most effective ways to identify this behavior is through network traffic analysis. Many of these applications rely on unencrypted HTTP or poorly implemented HTTPS to communicate with their backend. By setting up a transparent proxy or using a tool like Burp Suite, you can intercept the traffic and observe the data being sent.

A common pattern involves the application periodically checking in with a server to receive instructions or upload a batch of collected data. If you are testing a device, you can use tcpdump or a similar packet capture tool to monitor these connections:

# Monitor traffic on the device interface
adb shell tcpdump -i any -s 0 -w /sdcard/capture.pcap

Once you have the capture, you can analyze the payloads. You will often find that these applications are not just collecting device identifiers but are actively scraping user-generated content. This falls squarely into the realm of Broken Access Control, as the application is accessing data it has no business touching, and the operating system is failing to enforce the principle of least privilege.

Real-World Implications for Pentesters

For those of us in the field, this research changes the scope of a mobile engagement. It is no longer enough to test the application you are hired to audit. You must also consider the environment in which that application runs. If you are testing an app that handles sensitive financial or health data, you need to verify that the underlying OS or other pre-installed apps are not acting as a side-channel for data exfiltration.

The impact of these findings is significant. When a device is compromised at the firmware level, the user has almost no recourse. As researchers, we need to be more aggressive in reporting these findings to the relevant authorities, such as the Federal Trade Commission, when we encounter manufacturers that are knowingly shipping devices with pre-installed spyware.

Defensive Strategies and Next Steps

Defending against this level of compromise is difficult because the threat is baked into the supply chain. However, for enterprise environments, the solution is strict device management. Using Mobile Device Management (MDM) solutions to restrict the installation of non-approved applications and enforcing network-level filtering can mitigate the risk of data exfiltration.

If you are a researcher, the best way to contribute is by documenting these behaviors and sharing your findings with the community. Tools like APKeep are invaluable for downloading and analyzing APKs at scale, allowing you to build a repository of suspicious applications for further study. We need to stop treating mobile security as a siloed discipline and start looking at the entire ecosystem, from the hardware manufacturer to the final user interface.

The next time you are handed a mobile device for a test, do not just look at the application layer. Dig into the system partitions, look for unexpected background services, and monitor the network traffic for long-running connections to unknown endpoints. The data is leaking, and it is our job to find the holes.

Talk Type
panel
Difficulty
beginner
Category
privacy
Has Demo Has Code Tool Released


DEF CON 33 Main Stage Talks

98 talks · 2025
Browse conference →
Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in