SHAREit App Exposes Android Users to Malware and Spying

  • By Dawna M. Roberts
  • Published: Mar 02, 2021
  • Last Updated: Mar 21, 2023

The popular SHAREit Android app has been downloaded more than one billion times. In fact, it is one of the most popular apps on the Google Play store. However, it is full of bugs that expose users to malware and spyware. 

What is Going On?

SHAREit Malware

According to Threatpost, the flaws allow attackers to “hijack app features or overwrite existing files to execute malicious code, or launch man-in-the-disk (MiTD) attacks on people’s devices, researchers discovered.”

Even though researchers at Trend Micro alerted the app developer months ago about the dangerous vulnerabilities, they have yet to patch them. Trend Micro posted about this on their blog on Monday.

In their report, Trend Micro said, “We discovered several vulnerabilities in the application named SHAREit. The vulnerabilities can be abused to leak a user’s sensitive data and execute arbitrary code with SHAREit permissions by using a malicious code or app. They can also potentially lead to Remote Code Execution (RCE). In the past, vulnerabilities that can be used to download and steal files from users’ devices have also been associated with the app. While the app allows the transfer and download of various file types, such as Android Package (APK), the vulnerabilities related to these features are most likely unintended flaws.”

Anyone interested in the technical details of the flaws and the resulting exposure can read all about it here

What is the SHAREit App?

SHAREit is an Android app available on the Google Play store that allows Android users to quickly and easily share different types of files between mobile devices. It claims you can transfer photos, videos, music, and installed apps. The app also includes a built-in video and music player. It even contains GIFs, wallpaper, and stickers to boot.

However, over the past month, the internet has lit up with stories of how poorly SHAREit is coded and the numerous flaws causing all types of trouble for Android phone users. 

Tech heavy hitters like Gizmodo and ZNet have also chimed in to ring the alarm bell so that users will stop using the app until it is properly fixed. 

According to Gizmodo, SHAREit was developed by “Singapore-based developer Smart Media4U.” The trendy IT publication also claims that “Trend Micro researchers discovered this vulnerability by doing it themselves. By manipulating how apps in the Android ecosystem talk to each other, they found that the ShareIt app would share way too much information, revealing a user’s “arbitrary activities, including ShareIt’s internal (non-public) and external app activities.” In various ways, these security flaws could ultimately be “abused to leak a user’s sensitive data and execute arbitrary code with ShareIt permissions.”

How Has SHAREit Responded?

Unfortunately, even after they have received detailed information on these multiple flaws, the app developer has done nothing to patch them. All the tech publications discussing this issue raise questions about why the developer is not addressing the issues. Currently, SHAREit is receiving a lot of criticism for its handling of the situation. 

In January of 2021, the Trump administration hinted that the app was linked to Chinese hackers and blacklisted it. They implied that the app was designed to provide an avenue for data mining and access. Gizmodo mentioned that the app has been banned in India and that the primary user base stems from Africa, Asia, and the Middle East, not the U.S. 

How Can App Users Stay Safe?

This incident shows that you cannot be too careful or trust even the most popular apps. Some best practices for app use are:

  • Never download apps from untrusted sources.

  • Keep abreast of tech news and watch for reports of vulnerabilities. Delete any unpatched or flawed apps.

  • Keep your device updated with the latest OS patches and security software.

  • Install good antivirus software and run deep scans often.

  • Use strong password generator

  • Use common sense and if you think your device has been tampered with, consult professional technicians to clean it.

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

Cybersecurity Threats: What You Need to Know About Piggybacking

Cybersecurity Threats: What You Need to Know About Piggybacking

In cybersecurity, piggybacking refers to an unauthorized person gaining access to a restricted area or system by exploiting the access privileges of an authorized user, typically by following them or leveraging their credentials, usually without their knowledge or consent.

What You Need to Know about the Coast Guard Data Breach

What You Need to Know about the Coast Guard Data Breach

The Coast Guard is the only branch of the United States military in the Department of Homeland Security. It enforces federal law, controls the nation's borders and maritime Approaches, and protects the United States ports and waterways.

Mars Hydro Security Flaw Puts IoT Users at Risk

Mars Hydro Security Flaw Puts IoT Users at Risk

Mars Hydro is a leading Chinese brand producing a wide range of Internet of Things (IoT) devices for indoor gardening and the hydroponics industry.

What You Need to Know about the Community Health Center Data Breach

What You Need to Know about the Community Health Center Data Breach

Community Health Center (CHC) is a non-profit founded in 1972 and headquartered in Middletown, Connecticut. It offers a broad range of services, including dentistry, primary care, urgent care, specialty medical services, and behavioral health.

What You Need to Know about the DeepSeek Data Breach

What You Need to Know about the DeepSeek Data Breach

DeepSeek, founded by Liang Wenfeng, is an AI development firm located in Hangzhou, China. The company focuses on developing open source Large Language Models (LLMs) and specializes in data analytics and machine learning.

What is vendor fraud and how to protect your business from vendor fraud

What is vendor fraud and how to protect your business from vendor fraud

Vendor fraud is a type of financial abuse that occurs when fraudsters pose as legitimate businesses to trick companies and individuals into paying for services they'll never receive.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close