
Trend Micro has confirmed reports that some of its Mac consumer products were silently sending users’ browser history to its servers, and apologised to customers for any “concern they might have felt.”
However, in an advisory on its blog,the well-known internet security firm maintained that all collected data was “safe and at no point was compromised.”
Furthermore, Trend Micro claims that the data collection was not a secret – as users should have spotted they were agreeing to the data collection when they approved the software’s EULA at installation.
Yeah, because we all know that users read the license agreement when they install software – right?
In its advisory, Trend Micro confirmed researchers’ findings that products such as Dr Cleaner, Dr Cleaner Pro, Dr Antivirus, Dr Unarchiver, Dr Battery, and Duplicate Finder were snaffling users’ browser history, although Trend was at pains to point out that the data collection only occurred once per installation, and did not contain the full browser history:
“[The products] collected and uploaded a small snapshot of the browser history on a one-time basis, covering the 24 hours prior to installation. This was a one-time data collection, done for security purposes (to analyze whether a user had recently encountered adware or other threats, and thus to improve the product & service).”
The discovery of the apps’ behaviour resulted in them being kicked out of the Mac App Store (for now at least).
In response to concerns and media reports, Trend Micro says that it has now removed the browser data collection code from its affected consumer products, and deleted any legacy data logs.
But it’s the company’s final statement which caught my eye the most:
“Third, we believe we identified a core issue which is humbly the result of the use of common code libraries. We have learned that browser collection functionality was designed in common across a few of our applications and then deployed the same way for both security-oriented as well as the non-security oriented apps such as the ones in discussion. This has been corrected.”
In short, Trend Micro says that the code was designed to help the software determine if users had recently encountered online threats – and yet the code was also incorporated into products which were not security-related.
Dr Battery, for instance, is an app that purports to offer real-time monitoring of your Mac’s battery and determine which apps are draining resources the most. Why on earth would that need to take a gander at your browsing history?
It’s a similar story for Dr Unarchiver which – as its name suggests – allows you to browse, access, and extract files within archive formats. Nothing to do with adware, malware, or which websites you’ve been visiting.

Other software manufacturers should learn a lesson from this incident. Not only should you be sure to get positive agreement from your users as to what private data you may extract from them (and not hide it away in a EULA), but also you need to be careful to not be fattening up your different products with unnecessary code.
Shared code libraries that aren’t actually required by a program to perform its function increase the threat surface, introduce security and privacy vulnerabilities that could impact your customers, and – potentially – give more opportunities for hackers to strike.
For more discussion of this issue, be sure to listen to this episode of the “Smashing Security” podcast:
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Hello, hello, and welcome to Smashing Security Episode 95. My name is Graham Cluley.
The MetaCompliance guys provide animated e-learning and even games like phishing drills to test your knowledge.
Plus, these guys get passwords, they get GDPR, they get security, and they've won awards for security awareness.
Smashing Security listeners, you guys can get 10% off by visiting smashingsecurity.com/metacompliance and entering the code SMASHING. That's smashingsecurity.com/metacompliance.
MetaCompliance.
But it doesn't mean that the Mac App Store is entirely safe.
And in the last week or so, there have been a number of apps which have been booted out from the Mac App Store after being found scooping up users' private data, such as their browsing history in the background.
Naughty, naughty, naughty.
So these aren't obscure apps which are doing this.
There are apps which say, oh, we'll keep your Mac safe, we'll get rid of annoying pop-up ads, we'll discover and remove threats on your Mac.
Now, a couple of researchers, a guy called Privacy First—
He spotted the problem initially, but he found it hard to get Apple to take any action about these apps.
Unarchiver, Dr. Battery, and Duplicate Finder out of the App Store.
But what was most interesting to me is who was the developer of these data grabbers?
And yet that code was also incorporated into products which were not security-related.
Trend Micro went into panic mode and issued a statement.
They said, look, this was a one-time data collection done for security purposes to analyze the browser history, work out if someone had recently encountered adware or other threats, and thus to improve the product and service.
So you could argue that in short, what they were trying to do was they were improving the user security by compromising their security.
They were at pains to point out that not only was the data collection occurring once per installation, and wasn't actually including the full browser history, but also the users had agreed to this because they had approved the software license installation.
And there, buried away in the small print, was this little bit which said, look, we're going to take some of your data to analyze this.
Which raises an interesting question, isn't it?
Because it's often the spyware and the adware and nastiness like that, which takes advantage of people not properly reading the EULA, right?
To read all of them. Is that possible? I mean, it's a statistic from the internet, so I think it probably is believable.
I mean, when you install, for instance, an app on your Android device, it will say, you know, are you happy with it accessing the microphone and your location, even though it's an app to produce a flashlight, for instance, and people just go, "Yeah, yeah, yeah, just give me the app," don't they?
I know with a new version of macOS 10, which is coming out soonish, they'll warn you more about what the actual apps are trying to do.
But fundamentally, I think relying upon your users to read the license agreement, well, legally that might get you out of hot water because you have kind of told them.
But in all honesty, you haven't really told them, have you?
You're more likely to be safe if you download from a reliable source like that. And that people lower their guard because of that.
And also, you know, we've got to face the fact that although we work in this industry and therefore we're attuned to this stuff, other people aren't.
They're looking for this or that or the other functionality, and they're not necessarily savvy about whether XYZ functionality is needed for what they're doing.
You know, I often read and have to read it out loud really slowly, and who's going to take the time to do that?
No, what I've said is if you want less attacks, less arrows being thrown at you get a Mac, because there is much more malware.
There's much more malware and spyware for PC, so I do believe if you're running a PC, you're perhaps more likely to get infected by things and something nasty happen to you.
But that doesn't mean that you can forego protection and sensible practices on your Mac as well.
It's that companies that we are supposed to trust and want to build a relationship with and use their services, you know, maybe they're giving themselves a bit too much license and a bit too much access to stuff.
Well, it does, it feels creepy. I said that last week, but it still feels creepy.
Cybercrime is a bigger problem than ever before, but we don't need incidents like this corroding users trust in security firms, do we?
We want people to— we want people to install security software.
They've also deleted their logs of the data which they collected. Good.
And they've— including, they've also removed the feature from the non-security apps, which shouldn't have had that feature in it in the first place.
And I think that's the other story here, which other software manufacturers can learn a lesson from.
It's not only that you need to get positive, explicit consent from your users as to what you're going to do and what private data you might be extracting from them, so they actually consciously acknowledge that that's going to happen.
But you also shouldn't be fattening up your products with unnecessary code.
If you've got a shared code library, which appears to be what was happening in this case, if you're incorporated into programs which aren't planning or don't need that functionality, rip that code out.
Don't leave it there because it increases the threat surface, the chances of there being a bug or some unexpected functionality which was the case in, for instance, the Unarchiver.
Why would that need to check your browser?
But I think a lot of this stuff is being inflated because systems are faster, they can handle bigger programs, and they can just slap it in because why not?
Because they can get more data.
I haven't seen anything to suggest they were using it monetize it in some fashion or do advertising or sell it on to somebody else.
What certainly seems to be the case at the moment anyway is that rather than somebody digging into BA's backend systems and hacking into that, they were actually collecting it in real time from the forms that were being filled in.
So this was done, it seems anyway, through a script on the website.
It's credit card numbers, including, you know, the magic CVV number, the 3 numbers on the back of the card. Names, email addresses I've read.
No doubt we'll get clarification on this at some point, but at any rate, this is not a case, as we've seen in the past, of people hacking a backend system and guess what, you know, people's usernames and passwords and so on are not being secured properly.
This is a question of somebody doing it at the point at which it's being input.
You know, not only when you carry out security audits have you got to look at the sort of traditional aspects of that, including web servers and making sure you're up to date and your password policies are good and all of that.
But also you've got to make sure that any scripts that you've got running are also okay. And of course, it's often the case that companies are running third-party processes.
A third-party process is being used to— for payment or to deliver ads.
And so in that case, you've got to make sure that you are limiting the scope of what it can do.
And it's because they were all using this accessibility plugin designed for people who were, I think maybe were visually impaired or something like that. And that plugin got hacked.
And suddenly all these websites which were pulling down the JavaScript from that site were themselves hacked en masse.
So I guess one of the clues by which we know this is the way in which this occurred with the British Airways hack is they not only got the payment card regular details like your number and your expiry date, but they also got that magic 3-digit CVV number on the back, which isn't normally stored by businesses, is it?
Exactly. They don't store it, but it is input on the webpage. So if that webpage has been compromised with a malicious script, there's the opportunity for the criminal to grab it.
And I know certainly, Graham, you talked about one of the issues to do with legal challenges to this and legal firms trying to round people up about getting compensation.
Now clearly the ICO has something to say about this, and you know, they're pointing the finger at BA and there's culpability there. That's even worse.
They actually set up the day after the BA breach was announced, and they instantly released a press release saying that they were launching a £500 million class action suit over the British Airways hack.
What that actually means is that they are saying that they believe victims can claim up to £1,250 each. So multiply that by 380,000 and you get your £500 million.
Now, I think they were being rather opportunistic, and obviously they got their name in the press and all the rest of it, because I'm not sure we necessarily want law firms instantly jumping into these things and offering to help people get compensation.
I think that may not always work to the advantage actually of the consumer.
Because I use BA a lot. And I was so relieved that I wasn't, you know.
So if in 6 months or a year's time somebody gets hit with some kind of fraudulent activity, how as the victim of that do you tie it back into this?
Because at the end of the day, your details could have ended up in play from other kind of attacks other than the BA one.
And it's good to see the banks do that. I feel a bit sorry for the banks as well. You know, the banks have taken this on the chin. Oh no, it's BA's incompetence here, right?
Why should the banks have to?
Here's who's affected. We're contacting people.
How often have we seen the case where actually maybe months later or even years later, we're hearing about a breach that happened way after anybody had any chance to do anything about it.
They know that potentially they could lose— is it 4% of their gross worldwide turnover?
But BA, I suspect, are no longer everybody's favourite airline, are they? Do you remember that? They used to say that in their ads.
Crow, get your mind out of the gutter.
Okay, no, so Paul Manafort was Trump's former campaign manager who was raided by the FBI, charged, and found guilty of 8 charges of fraud.
And he's, I think he's sitting in jail waiting for his sentence. I think it's a maximum sentence of 80 years.
All right, I'm going to give you a bit of a quick backstory, and then I want your help in figuring out whether the wrongs outweigh the rights or vice versa.
So about a year and a half ago, this big data dump was flitting around on the dark web, and this data dump allegedly contained over 280,000 text messages which were sent and received by one of Paul Manafort's daughters.
But yeah, so basically all of this daughter's text messages and the ones that she's received and sent, right, were basically collated into this big dump and it was kind of going around the dark web, right?
And rumor had it that the reason this had happened was the daughter's phone was hacked, right?
So at the time, some news agencies kind of tweezered out a few politically Manafort or Paul Manafort-related messages from this big glut.
These are messages that seem to have some context around the political arena and some of his shady dealings with Russian-friendly forces.
And it was argued that this was newsworthy and therefore warranted public attention.
Of course, also some people might call less reputable media, like the National Enquirer, also dished out stories. One where Papa Manafort apparently allegedly had an affair.
National Enquirer cited the hacked messages to kind of validate the story.
Now, okay, so fast forward to a few months ago, 20th of July, a freedom of information activist known as Emma Best decided to make the full data set of personal text correspondence searchable and available to anyone who wanted.
And it was announced via Twitter. It was written on Twitter, today I am releasing a searchable transcript of over 285,000 Manafort text messages that WikiLeaks would not publish.
You can find the what, why, and where at. It gives a link.
This all happened about a month ago, and the reason this is back in the news is largely due to the Streisand effect, Manafort's daughter's lawyer sent a letter to Twitter demanding they remove this Emma Best tweet.
And in turn, Twitter just this week sent the activist a letter saying, would you voluntarily remove the tweet? And she told Motherboard, no intention of doing that.
Between Manafort's daughter and friends, colleagues, family, etc., etc., etc. It's going to contain private stuff, confidential stuff, personal stuff.
You know, if this happened to me, messages that, you know, you'd be affected, Graham.
Because to be a responsible freedom of information activist, must you provide all information, no matter how personal, to a victim circle?
Like, can you not redact over, you know, maybe redacting gets you in trouble as well because people are saying, well, it's redacted, so who knows what's redacted?
So one is the data has already been exposed and the damage done. Well, no one has provided it in a searchable, unredacted format. So it's very convenient now.
And this is one point I found interesting.
It says those involved know that the messages were hacked and that their phone numbers and email addresses, in case of some iMessage, have been exposed.
They've had over a year to change their numbers and take steps to block harassment. Therefore, any harm in this regard is minimal.
They've been told, look, this is upsetting people. This is hacked text that the woman didn't hand over that are being mined by third parties against the victim's wishes.
Or I may go to Google and try and get links to that particular web page removed, you know, saying, look, this is damaging my privacy.
So not only does Twitter not let us have a G in Smashing Security—
Just go to SmashingSecurity.com, you should know that website, /meta-compliance and enter the code smashing with a G.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they like, doesn't have to be security related necessarily.
No, I'm going to give you something which is really rather handy and may actually put some bucks or some pound notes in your back pocket.
It is a website called airhelp.com — air as in aeroplane.
There I was at Birmingham Airport trying to get to Edinburgh and the flight was cancelled, and I had to wait around at Birmingham Airport with you, Carole.
And then I heard about this website called Airhelp, and it said, look, if you've had a cancelled flight or a delayed flight, you might be able to get compensation.
There I was, I was thinking, I wonder if I could get compensation for that.
And all I had to do was enter my name and a confirmation number of the flight I was on, and it chugged and churned away, and about a month later it came back and it put £170 in my bank account — kaboom!
But I figured that was a small price to pay for not having to do anything.
It's a very handy website, so if you are on a delayed flight you might want to try airhelp.com — you can even import your flight history, should you feel safe about doing that.
I just had my booking reference number, my name, obviously my contact details, and the flight number, and it went chug chug chug, and I chose some radio buttons saying it was delayed.
No, it wasn't actually, but yes, you can import flights you've made in the last three years if you want it to chug away and look at all of them.
Something— an article in Forbes caught my eye, and it was really to do with employing autistic people, and specifically to do with stopping cyber attacks, because some of the characteristics and skills that autistic people— many autistic people have could be very useful.
It doesn't just apply to cybersecurity, however.
Seeing patterns, persistence, logical thinking, all of these things really— attention to detail is another one— are facets of autism.
And actually, we're missing a trick if as a society we don't actually milk this, if we don't use these skills.
Clearly, this is very topical in cybersecurity because we're facing a cyber skills shortage.
You know, there's a danger, I think, as awareness about autism has grown, that people tend to think, well, everyone on the spectrum is like Rain Man, you know, or they can recite pi to 27,000 decimal places, which certainly one guy can who's autistic, but that's not—
I don't think that's a world record.
I mean, I can recall, I've got a son who's autistic, and I can recall when he was about 8. A bit of background.
I mean, when Disney Pixar put out, I think it was Finding Nemo, it had a short film called Knick-Knack.
And it was about knickknacks on a dressing table and how the guy in the snow globe wanted to join them for a party. But in Toy Story 2, it made a sort of cameo appearance.
Woody, one of the main characters in Toy Story, gets kidnapped in that particular movie, and the rest of the toys know that it was the guy that advertises the toys who wears the chicken suit who'd kidnapped him.
So they decide they'll flick through all the channels very, very quickly to find the advert with the chicken man in. And they're going through at a rate of knots looking for this.
Anyway, we'd watch this and my son said to me, oh, that's a knick-knack. And I said, what do you mean it's knick-knack?
And the next time we watched it, I stopped it and freeze-framed it. And sure enough, one clip, one static clip from one of the channels on those of this particular short film.
How he saw it, I don't know, but you know, he's got that level of attention to detail.
And so, you know, these are skills which not just in cybersecurity but elsewhere are very valuable.
So go to Cold War Steve on Twitter. This is a crazy photo montage world of McFadden's Cold War. It's kind of dark and it's snigger-worthy as well.
So there's photo montages that are mashed up with some of our best known, if least liked, political leaders or footballers or soap stars.
And of course, Noel Edmonds, who shows up everywhere. So you'll see Boris Johnson, Theresa May, even Ant and Dec make an appearance.
David Cameron's tasseled loafers make an appearance. It's just, it's really quite fun. I've been looking, I saw it in an article in The Guardian, I don't know, a month ago or so.
So these are, yes, so these are photo montages, lots of British celebrities typically, although I'm seeing some Americans as well, in bizarre situations.
And what's really cute is this guy apparently knocks these out on his bus commute, which, you know, I've done a bit of, you know, quick editing this, you know.
So check out McFadden's Cold War on Twitter and enjoy.
On that slightly bizarre note, I think we just about wrap it up for this week. David, if people want to find out more about you or follow you online, what's the best way to do that?
We're giving away things for free. And if you follow us on our— what?
It helps new listeners discover us.
And, you know, to say, you know, Graham is my favourite, something like that.


"Dr Battery, for instance, is an app that purports to offer real-time monitoring of your Mac’s battery and determine which apps are draining resources the most. Why on earth would that need to take a gander at your browsing history?"
Acutally, this is actually the easiest one to understand. If I download an app who's sole purpose is to see how hot you can get your device before it shuts down, then I'm sure Dr Battery would love to know about this app.
Nah, Dr Battery should keep its nose out, and simply report the drainage
Battery and browsing history could be linked to web miners, if I'm not wrong. Thus eventually helping to identify drains :D