ADUPS Android Malware Infects Barnes & Noble

Realistically, the only safe way to use the BNTV450 would involve a format of the eMMC, and the installation of a third-party ROM, should one become available.

Privacy Notice from ADUPS

ADUPS has issued a total of four press releases, beginning on November 16, 2016:

The first and most important message in this collection is: "ADUPS sincerely apologizes to its partners and users."

Granted, that ADUPS as a corporate entity expresses regret, there are a number of points raised that are inconsistent with the reported narrative:

  • ADUPS claims that a new upgrade of its agent (version 5.5) is no longer capable of extracting sensitive data. Credibility will require independent review and confirmation from a trusted security organization (that is, a source code review by Kryptowire, NowSecure, or Zimperium). "Buzz Lab" below is listed, but an organization within the United States is essentially required to establish credibility as this was the location of the theft.

  • The BNTV450 appears to be running the following UNSAFE version of ADUPS: android:versionName="". This was obtained by uploading the AdupsFota.apk file to and examining the Android manifest.

  • It is asserted that ADUPS "has been cooperating with Google," and further that "We released updated version for Adups FOTA 5.5 immediately, this version has been certified by Google Security Team and Chinese well-known third party organization Buzz Lab." (Google appears to think that "Buzz Lab" is a Boston video production company.) This requires a formal statement from Google that CTS no longer blacklists the relevant versions of the ADUPS agent, preferably along with their reasoning.

  • ADUPS continues to collect IP addresses by their own admission in their latest documents. An IP address can be used to uniquely identify individuals, and the practice should cease immediately: "The only data that is collected through Version 5.5 (and subsequent updates thereof as appropriate) are basic device information and product model information, such as device type, platform, model, version, IP address, International Mobile Equipment Identity (IMEI), etc."

  • ADUPS appears to have spent a significant amount of its corporate life behaving as a malware company. Why are we now advised to accept the new version of its agent as a valid member of the Android infrastructure community? Who vouches that it is appropriate for security-sensitive OTA updates?

  • Kryptowire provided evidence that weak DES encryption was used on SMS messages prior to transmission. ADUPS disputes this with various statements: 1) "ADUPS utilizes https in the transmitting process and uses multiple encryption to ensure data safety." 2) "For example, all data transmission to the ADUPS server was carried out via secure HTTPS channels." 3) "Sensitive data such as SMS messages was further encrypted before the compression." 4) "All user data was compressed before transmission to the ADUPS server and the compressed data was transmitted over a secure HTTPS channel to an ADUPS web server." It is not sufficient to excuse the weak DES cipher with "https" in these statements—specifics are required. Was this TLSv1, TLSv1.1 or TLSv1.2? Did this use AES? Were the sessions configured for forward secrecy with DHE or ECDHE? Was an AEAD cipher used? Did compression introduce the risk of a CRIME attack? What are the scan results from on the relevant server components? These statements cannot be accepted without far greater detail.

  • Among other claims of what was not included in the dataset, "The users' contact list was also not part of the collected data." This also requires independent verification, preferably from Kryptowire.

  • Air-gap isolation appears to be asserted: "Specifically, the data storage server is located in a Tier 4 data center and is physically isolated from external contact." However, a firewall is later mentioned: "All ADUPS data storage servers are located within the ADUPS internal network that is protected by a firewall." Was the data storage attached to a network, or not?

  • ADUPS should post the session logs supporting this statement: "After ADUPS was contacted by BLU Products regarding the data collection issue on October 28, 2016, ADUPS promptly wiped all cell tower ID data, and call and SMS data from its server."

  • ADUPS is headquarted in Shanghai, but also lists physical locations in Shenzen, Taipei, and New Delhi. The data server, however, is located in Hong Kong. What jurisdictions have touched this data, and could be involved in legal action concerning a breach? "ADUPS' server for overseas users is based in Hong Kong which has stringent data protection laws."

Are the statements above enough to trust the new ADUPS 5.5 agent? Regulatory authorities have yet to speak.


Advice for several players in this malware advance is forthcoming.

To Barnes & Noble, your devices with production software should be reviewed by security specialists before a release to manufacturing. Had Kryptowire, NowSecure or Zimperium assesed the security of this Android release, they would certainly have halted attempts to market an Android version with blacklisted malware and an open CVE. Far better to miss the Christmas sales season than to see your customers' vital data in a Chinese database beyond your jurisdiction.

To ADUPS, you must relinquish total control of your Android community, especially in the United States. Our privacy must be beyond your temptation.

To MediaTek, if you respect your customers, you will be welcome. If you abuse your customers, you will be banned from our shores.

And Google, as the master of this puppet show, the quiet withdrawl of the Android Update Alliance did not go unnoticed, and 18 months of patches is far, far too short. Enterprise Linux easily commits to 5-year support cycles. The Pixel is not and cannot be the solution for Android's annus horribilis of 2016, and there is nothing in Google's corporate actions to lead us to believe that 2017 will be any better.

In any event, case number 78952613 has been opened with the Federal Trade Comission on this issue.

Android is fast escaping the management ability of its owners. If we are not yet at the point of nationalizing this critical resource and managing AOSP by congressional control, then we are quite close.

*Disclaimer, the views and opinions expressed in this article are those of the author and do not necessarily reflect those of Linux Journal.


Charles Fisher has an electrical engineering degree from the University of Iowa and works as a systems and database administrator for a Fortune 500 mining and manufacturing corporation.