TikTok caught secretly spying on millions of iPhone users

Apple iOS apps can read the last thing copied to clipboard

Apple recently fixed a bug in iOS 14 that allows apps to secretly access the clipboard on Apple devices. The new OS will warn users when an app reads the last item copied to the clipboard, but several apps have already been caught invading people’s privacy, including TikTok, according to security researchers Talal Haj Bakry and Tommy Mysk

China’s Bytedance, owner of TikTok, stated the problem is tied to an outdated advertising SDK. However, according to the clipboard warning in iOS 14 beta, TikTok is continuing to abuse users’ privacy.

A company spokesperson said it was “triggered by a feature designed to identify repetitive, spammy behavior.” TikTok submitted an updated version of the app without the anti-spam feature to the App Store.

The TikTok spokesperson added: “The clipboard access issues showed up due to third-party SDKs, in our case an older version Google Ads SDK, so we do not get access to the information through this. We are in the processes of updating so that the third-party SDK will no longer have access.” 

Changes to Apple’s iOS 14 security and privacy settings helped to identify TikTok and other apps secretly accessing the clipboard. The vulnerability meant anything copied on a user’s Mac or iPad could be read by active apps on their iPhone, including passwords, work documents, personal emails and financial documents.

Apple’s iOS fix will force TikTok and other companies to update their apps.

Apple initially ignored the clipboard vulnerability, eventually publishing a fix following media coverage of the security findings. According to Bakry and Mysk, “Apple dismissed the risks that we highlighted and explained that iOS already had mechanisms to counter all of the risks. But the mechanisms that Apple provided were not effective to protect user privacy.” 

iPhone users should update their TikTok app when the newest version is released.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

Parler suffers data leak before being taken offline
social media

Parler suffers data leak before being taken offline

12 Jan 2021
United Nations suffers potential data breach
data breaches

United Nations suffers potential data breach

11 Jan 2021
Google sets a date for Chrome extension privacy revamp
web browser

Google sets a date for Chrome extension privacy revamp

10 Dec 2020
Trump's TikTok ban hits another roadblock
social media

Trump's TikTok ban hits another roadblock

9 Dec 2020

Most Popular

SolarWinds hackers hit Malwarebytes through Microsoft exploit
hacking

SolarWinds hackers hit Malwarebytes through Microsoft exploit

20 Jan 2021
How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

12 Jan 2021