Popular child-monitoring Android apps have been secretly tracking the parents too

Android
(Image credit: Google)

Mobile apps that help people monitor their children are also leaking the parents’ data to third parties, and possibly malicious actors, researchers have found.

The Cybernews research team recently took a closer look at the ten most popular child tracking apps. These are essentially surveillance apps, designed for parents who fear for their children’s safety and want to use their mobile devices to make sure they are safe.

Cumulatively, these apps have amassed more than 85 million downloads among them. However, none received the highest grade for privacy and one app with more than 50 million installs was even deemed a “critical risk”.

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022end of this survey

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99.

Tracking the trackers

One of the problems with these apps is that they carry third-party trackers, meaning that both children and parents are having their data harvested, the researchers explained. The data can be used for a wide variety of things, but mostly it’s used for targeted advertising. 

While some apps carried two trackers, some were found with as many as nine trackers.

One of the apps, which also made it into the top 50 free apps in the social category in the US, was found to share Broadcast Receivers, an Android component that allows apps to respond to messages that the OS broadcasts.

That means that other apps on the device can access the tracker, including malicious apps, giving potential attackers insight into the movement of children - and the parents too.

Furthermore, these apps have insecurely implemented Secure Sockets Layer (SSL) certificate handling, leaving them vulnerable to man-in-the-middle attacks. In other words, attackers can “eavesdrop” on the data going between two apps. 

The problem, some experts believe, lies in the fact that many app developers can’t be bothered to build robust code themselves, but rather take as much as they can from open source libraries, often being oblivious to the risks that brings.

"It's like making cheap sausage, and you don't know what kind of ingredients are going into it. The problem for the end-user is that you really don't know all that is in the app or how many different parties are receiving this information," Karim Hijazi, CEO of cyber intelligence company Prevailion, told Cybernews.

Via Cybernews

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Kaspersky Report on Stalkerware
Security flaw in popular stalkerware apps is exposing phone data of millions
Stalkerware
New spyware found to be snooping on thousands of Android and iOS users
 In this photo illustration a Google Play logo seen displayed on a smartphone.
Why is there so much spyware hidden in the Play Store?
An Android phone being held in the hand
These malicious Android apps were installed over 60 million times - here's how to stay safe
Photograph of a hand holding a smartphone with two googly eyes
Every tap, every message – how to stop your smartphone spying on you
Spyware
Stalkerware data breach potentially hits over 2 million users, including thousands of Apple devices
Latest in Software & Services
TinEye website
I like this reverse image search service the most
A person in a wheelchair working at a computer.
Here’s a free way to find long lost relatives and friends
A white woman with long brown hair in a ponytail looks down at her computer in a distressed manner. She is holding her forehead with one hand and a credit card with the other
This people search finder covers all the bases, but it's not perfect
That's Them home page
Is That's Them worth it? My honest review
woman listening to computer
AWS vs Azure: choosing the right platform to maximize your company's investment
A person at a desktop computer working on spreadsheet tables.
Trello vs Jira: which project management solution is best for you?
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)