A mobile browser owned by China's Alibaba Group contained privacy risks that could have exposed users' personal data, according to a security group.
The flaws were found in UC Browser, a third-party app that's been expanding in popularity across the globe, and has over 100 million daily active users. Last year, Chinese e-commerce giant Alibaba Group acquired UC Browser's parent company.
The Citizen Lab at the University of Toronto's Munk School of Global Affairs investigated the mobile browser, and found that it was sending user data unencrypted, or with not enough encryption. This included transmitting phone numbers and device serial numbers, in addition to user search queries and geolocation data.
The lack of encryption would let anyone with access to the data traffic to identify a user's phone number, the device, and the person's location, Citizen Lab said in its report released Thursday.
Both UC Browser's Chinese language and English language versions contained the reported flaws. On Friday, Alibaba said it investigated the issues and has fixed the problem with a version update users can now download. "We have no evidence that any user information has been taken," the company said in an email.
The privacy risk is that governments such as China and India often require telecommunication providers to hand over their data traffic, Citizen Lab said. Any personal data leaked through UC Browser could be used by governments or other third parties, it added.
Citizen Lab investigated the UC Browser after a leak of a 2012 document by Edward Snowden, disclosed by Canada's CBC News, showed that Canada's intelligence agency and its partners were allegedly aware of security flaws in UC Browser, and wished to exploit them for electronic surveillance.
Although Citizen Lab found problems with UC Browser's software, the group could not confirm if they were the same vulnerabilities detailed in the document disclosed by the former National Security Agency contractor.
Join the CIO New Zealand group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.