{"id":9732,"date":"2017-10-25T14:37:45","date_gmt":"2017-10-25T10:37:45","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=9732"},"modified":"2019-11-15T15:23:43","modified_gmt":"2019-11-15T11:23:43","slug":"dating-apps-threats","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/dating-apps-threats\/9732\/","title":{"rendered":"Are dating apps safe?"},"content":{"rendered":"<p>Searching for one\u2019s destiny online \u2014 be it a lifelong relationship or a one-night stand \u2014 has been pretty common for quite some time. Dating apps are now part of our everyday life. To find the ideal partner, users of such apps are <a href=\"https:\/\/www.kaspersky.com\/blog\/online-dating-report\/?_ga=2.232545500.257563195.1508426640-1365174779.1500043331\" target=\"_blank\" rel=\"noopener nofollow\">ready to reveal<\/a> their name, occupation, place of work, where they like to hang out, and lots more besides. Dating apps are often privy to things of a rather intimate nature, including the occasional nude photo. But how carefully do these apps handle such data? Kaspersky Lab decided to put them through their security paces.<\/p>\n<p>Our experts <a href=\"https:\/\/securelist.com\/dangerous-liaisons\/82803\/\" target=\"_blank\" rel=\"noopener\">studied the most popular mobile online dating apps<\/a> (Tinder, Bumble, OkCupid, Badoo, Mamba, Zoosk, Happn, WeChat, Paktor), and identified the main threats for users. We informed the developers in advance about all the vulnerabilities detected, and by the time this text was released some had already been fixed, and others were slated for correction in the near future. However, not every developer promised to patch all of the flaws.<\/p>\n<h2>Threat 1. Who you are?<\/h2>\n<p>Our researchers discovered that four of the nine apps they investigated allow potential criminals to figure out who\u2019s hiding behind a nickname based on data provided by users themselves. For example, Tinder, Happn, and Bumble let anyone see a user\u2019s specified place of work or study. Using this information, it\u2019s possible to find their social media accounts and discover their real names. Happn, in particular, uses Facebook accounts for data exchange with the server. With minimal effort, anyone can find out the names and surnames of Happn users and other info from their Facebook profiles.<\/p>\n<p>And if someone intercepts traffic from a personal device with Paktor installed, they might be surprised to learn that they can see the e-mail addresses of other app users.<\/p>\n<p>Turns out it is possible to identify Happn and Paktor users in other social media 100% of the time, with a 60% success rate for Tinder and 50% for Bumble.<\/p>\n<h3>Threat 2. Where are you?<\/h3>\n<p>If someone wants to know your whereabouts, six of the nine apps will lend a hand. Only OkCupid, Bumble, and Badoo keep user location data under lock and key. All of the other apps indicate the distance between you and the person you\u2019re interested in. By moving around and logging data about the distance between the two of you, it\u2019s easy to determine the exact location of the \u201cprey.\u201d<\/p>\n<p>Happn not only shows how many meters separate you from another user, but also the number of times your paths have intersected, making it even easier to track someone down. That\u2019s actually the app\u2019s main feature, as unbelievable as we find it.<\/p>\n<h3>Threat 3. Unprotected data transfer<\/h3>\n<p>Most apps transfer data to the server over an SSL-encrypted channel, but there are exceptions.<\/p>\n<p>As our researchers found out, one of the most insecure apps in this respect is Mamba. The analytics module used in the Android version does not encrypt data about the device (model, serial number, etc.), and the iOS version connects to the server over HTTP and transfers all data unencrypted (and thus unprotected), messages included. Such data is not only viewable, but also modifiable. For example, it\u2019s possible for a third party to change \u201cHow\u2019s it going?\u201d into a request for money.<\/p>\n<p>Mamba is not the only app that lets you manage someone else\u2019s account on the back of an insecure connection. So does Zoosk. However, our researchers were able to intercept Zoosk data only when uploading new photos or videos \u2014 and following our notification, the developers promptly fixed the problem.<\/p>\n<p>Tinder, Paktor, Bumble for Android, and Badoo for iOS also upload photos via HTTP, which allows an attacker to find out which profiles their potential victim is browsing.<\/p>\n<p>When using the Android versions of Paktor, Badoo, and Zoosk, other details \u2014 for example, GPS data and device info \u2014 can end up in the wrong hands.<\/p>\n<h3>Threat 4. Man-in-the-middle (MITM) attack<\/h3>\n<p>Almost all online dating app servers use the HTTPS protocol, which means that, by checking certificate authenticity, one can shield against <a href=\"https:\/\/securelist.com\/threats\/man-in-the-middle-attack-glossary\/\" target=\"_blank\" rel=\"noopener\">MITM<\/a> attacks, in which the victim\u2019s traffic passes through a rogue server on its way to the bona fide one. The researchers installed a fake certificate to find out if the apps would check its authenticity; if they didn\u2019t, they were in effect facilitating spying on other people\u2019s traffic.<\/p>\n<p>It turned out that most apps (five out of nine) are vulnerable to MITM attacks because they do not verify the authenticity of certificates. And almost all of the apps authorize through Facebook, so the lack of certificate verification can lead to the theft of the temporary authorization key in the form of a token. Tokens are valid for 2\u20133 weeks, throughout which time criminals have access to some of the victim\u2019s social media account data in addition to full access to their profile on the dating app.<\/p>\n<h3>Threat 5. Superuser rights<\/h3>\n<p>Regardless of the exact kind of data the app stores on the device, such data can be accessed with superuser rights. This concerns only Android-based devices; malware able to gain root access in iOS is a rarity.<\/p>\n<p>The result of the analysis is less than encouraging: Eight of the nine applications for Android are ready to provide too much information to cybercriminals with superuser access rights. As such, the researchers were able to get authorization tokens for social media from almost all of the apps in question. The credentials were encrypted, but the decryption key was easily extractable from the app itself.<\/p>\n<p>Tinder, Bumble, OkCupid, Badoo, Happn, and Paktor all store messaging history and photos of users together with their tokens. Thus, the holder of superuser access privileges can easily access confidential information.<\/p>\n<h3>Conclusion<\/h3>\n<p>The study showed that many dating apps do not handle users\u2019 sensitive data with sufficient care. That\u2019s no reason not to use such services \u2014 you simply need to understand the issues and, where possible, minimize the risks.<\/p>\n<h3>Do\u2019s:<\/h3>\n<ul>\n<li>Using a <a href=\"https:\/\/www.kaspersky.com\/blog\/choose-your-vpn\/\" target=\"_blank\" rel=\"noopener nofollow\">VPN<\/a>;<\/li>\n<li>Installing <a href=\"https:\/\/store.kaspersky.com\/store\/kaspersk\/en_IE\/buy\/productID.320853100\/quantity.1\/Currency.USD?cid=gl_socmed_pro_ona_smm__onl_b2c_kasperskydaily_lnk____kismd___&amp;affiliate=gl_socmed_pro_ona_smm__onl_b2c_kasperskydaily_lnk____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">security solutions<\/a> on all of your devices;<\/li>\n<li>Sharing information with strangers only on a need-to-know basis.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-cyberattacks\">\n<h3>Don\u2019ts:<\/h3>\n<ul>\n<li>Adding your social media accounts to your public profile in a dating app; giving your real name, surname, place of work;<\/li>\n<li>Disclosing your e-mail address, be it your personal or work e-mail;<\/li>\n<li>Using dating sites on unprotected Wi-Fi networks.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>We are used to entrusting dating apps with our innermost secrets. How carefully do they treat this information?<\/p>\n","protected":false},"author":2458,"featured_media":9737,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1225,1485],"tags":[109,1523,296,1524,43],"class_list":{"0":"post-9732","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-special-projects","9":"tag-apps","10":"tag-dating","11":"tag-online-dating","12":"tag-oversharing","13":"tag-privacy"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/dating-apps-threats\/9732\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/dating-apps-threats\/11680\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/dating-apps-threats\/13088\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/dating-apps-threats\/12008\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/dating-apps-threats\/11644\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/dating-apps-threats\/14676\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/dating-apps-threats\/14403\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/dating-apps-threats\/19060\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/dating-apps-threats\/4350\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/dating-apps-threats\/19905\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/dating-apps-threats\/9711\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/dating-apps-threats\/9807\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/dating-apps-threats\/8429\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/dating-apps-threats\/15111\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/dating-apps-threats\/18545\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/dating-apps-threats\/18971\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/dating-apps-threats\/18959\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/online-dating\/","name":"online dating"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/9732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2458"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=9732"}],"version-history":[{"count":4,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/9732\/revisions"}],"predecessor-version":[{"id":14801,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/9732\/revisions\/14801"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/9737"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=9732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=9732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=9732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}