DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Researchers Find Major Security and Privacy Issues in Smart Sheriff Parental Monitoring Application

Posted on September 21, 2015 by Dissent

I had first raised concerns about “Smart Sheriff” software back in May when I first heard about it, but now The Citizen Lab has investigated it more and issued a concerning report. Their press release, courtesy of a Canadian reader:

Toronto, Canada (20 September  2015) — Today, the Citizen Lab at the Munk School of Global Affairs, University of Toronto is releasing a new report, “Are the Kids Alright? Digital Risks to Minors from South Korea’s Smart Sheriff Application.” The report details results of two independent audits of the privacy and security of Smart Sheriff, a parental monitoring application that has been promoted by the South Korean government.

The researchers found 26 vulnerabilities that could compromise the privacy and security of minors and parents who use Smart Sheriff. The audits were conducted by researchers who collaborated at the 2015 Citizen Lab Summer Institute, and by the security audit firm Cure53.

“Parents worldwide have growing concerns about their children’s use of social media and mobile devices. However, this case shows precisely how good intentions can end up seriously wrong — in this case, a government-promoted parental monitoring application actually putting children at greater, rather than less, risk of harm.” — Ron Deibert, Director of the Citizen Lab, and Professor of Political Science at the University of Toronto.

The researchers notified the developers of vulnerabilities following a responsible disclosure process, and sought to have the issues addressed in a timely fashion. As of the date of publication, it is not clear whether the problems identified have been corrected.

Background

In April 2015, a mandate proposed by the Korean Communications Commission (KCC) came into effect requiring South Korean telecommunications operators to provide the means to block harmful content on minors’ mobile phones. While a number of applications meet the requirements, Smart Sheriff, developed by the Korean Mobile Internet Business Association (MOIBA), received promotion and financial support from the KCC. Compared to other Korean-language parental parental-monitoring applications, it is widely used (between 100- and 500 thousand users), and has received substantial publicity from the KCC.

Smart Sheriff, which is available for Android and iPhone, allows parents to remotely block content and monitor and administer applications on their child’s mobile device, as well as schedule when the phone can be used.

Findings

The researchers identified 26 security vulnerabilities in recent versions of Smart Sheriff on Android (versions 1.7.5 and under). These vulnerabilities could be used by an attacker to disable Smart Sheriff accounts, tamper with data, and steal personal information, the report explains.

Privacy and Encryption Problems

The Smart Sheriff versions analyzed by the researchers stored and transmitted user data insecurely, and did not properly implement industry-standard encryption. This insecurity makes it possible for attackers to monitor data, and impersonate both servers and apps to tamper with data.

The researchers also found that Smart Sheriff sends browsing data back to MOIBA servers, despite this functionality purportedly being disabled in May 2015 over privacy concerns.

Authentication Problems

The researchers found accounts can be registered and managed without proper validation or passwords, which could lead to the compromise and hijacking of user accounts. Attackers could even remotely disrupt some of the functions of phones that have Smart Sheriff installed. In addition, Smart Sheriff’s parental limits and controls can be easily disabled and circumvented.

Infrastructure Problems

The researchers found Smart Sheriff’s infrastructure is not properly maintained or protected. The servers are running outdated software, according to the report, and do not properly implement industry-standard security and encryption. In addition, the servers do not track or reject brute force attempts to collect user data or erroneous requests, which could lead to compromise of the service, and its users, at a large scale.

“The technical issues that were discovered represent fundamental failures to follow commonplace practices for protecting user information and securing the Smart Sheriff application. With little effort, these vulnerabilities could allow children to bypass parental protections, allow malicious attackers to disrupt access to every user’s device, and interfere with the operations of the service. Such failures demonstrate an inattention to children’s security from the foundation of the application, and, even more concerning, have been open for exploitation for years.” – Collin Anderson, Independent Researcher

Legal and Policy Implications

“The problems with Smart Sheriff suggest that the application does not meet the requirements for data protection and information security established under Korean law.” – Sarah McKune, Senior Legal Advisor, The Citizen Lab

The Citizen Lab report claims the insecure design of the application also runs counter to the representations made by MOIBA in Smart Sheriff’s Terms of Service and Privacy Policy. Furthermore, according to the researchers, Smart Sheriff’s functionality impinges upon the privacy rights of its users, while exceeding the actual requirements of the April 2015 mandate.

“This situation raises serious concerns under international human rights law, given the potential of this government-supported mobile application to compromise user privacy, and the widespread adoption of the app as a result of the government mandate.” – Sarah McKune, Senior Legal Advisor, The Citizen Lab

What should concerned users do?

Citizen Lab is releasing this report to advise current and potential users of the Smart Sheriff application, as well as Korea’s regulators, of the security and privacy concerns so that they can make their own informed choices about their data security.

Citizen Lab contacted MOIBA and shared the technical details of these findings, and gave them 45 days to address the issues before publishing their report. On August 5, a MOIBA representative replied, and provided an initial timeline for addressing 15 of the vulnerabilities. On August 6, MOIBA released an updated version of the application (v1.7.6) that supported HTTPS. A further update (v1.7.7) released on August 25 claimed to address additional vulnerabilities. However, the Citizen Lab researchers note that as of September 20, 2015, they had not independently verified whether the problems had been fixed.

The research team urges caution against further public use and promotion of the application until an independent and thorough audit of Smart Sheriff can be conducted.

Concerned users can contact MOIBA directly for further details on their progress in resolving the security vulnerabilities (email: burdli@moiba.or.kr website: https://ss.moiba.or.kr).

Read the full report.
Category: Commentaries and Analyses

Post navigation

← Inside Target Corp., Days After 2013 Breach
AU: Townsville adult store blackmailed by hackers →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Investigation of 2024 Helsinki data breach – Report
  • Major trial underway for data leak that left 72,000 victims in France
  • Anubis: A Closer Look at an Emerging Ransomware with Built-in Wiper
  • HealthEC Agrees to $5.48 Million Settlement to End Data Breach Lawsuit
  • US offering $10 million for info on Iranian hackers behind IOControl malware
  • Sompo Japan Insurance submits improvement plan after info leakage
  • Moreno Valley, Calif., Schools Report Data Breach
  • The Growing Cyber Risks from AI — and How Organizations Can Fight Back
  • UPDATING: Credit Control Corporation denies any current breach
  • Copilot AI Bug Could Leak Sensitive Data via Email Prompts

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Your household smart products must respect your privacy – including your air fryer
  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report