Coding With Fun
Home Docker Django Node.js Articles Python pip guide FAQ Policy

Is the mintegral sdk a malicious sdk?


Asked by Charlee Maxwell on Dec 11, 2021 FAQ



Snyk notified Apple of the malicious SDK (a software component that developers use to add functionality to their apps without having to write code themselves) a week ago. Along with standard and completely kosher ad network functionality, the Mintegral SDK performs click attribution fraud, Grander told me in an interview for the TechFirst podcast.
Next,
At runtime, the SDK uses method swizzling to inject malicious code into the implementations of numerous methods and handlers. These hooks allow it to intercept any URL-based request made from within the app, even those that occurred outside of the Mintegral SDK.
Similarly, The Mintegral SDK for iOS is said to contain malicious code designed to monitor user activity in order to facilitate ad fraud, and apparently this has been going on for over a year. Like other third-party advertising SDKs, the Mintegral SDK is a tool that helps developers monetize their apps via advertising.
In fact,
Like other third-party advertising SDKs, the Mintegral SDK is a tool that helps developers monetize their apps via advertising. It is used in approximately 1,200 iOS apps that are collectively in use by 300 million new users per month, so that’s a huge number of users who might have had their personal information exposed.
Consequently,
However, through our research and in collaboration with experts from the mobile advertising industry, the Snyk team has discovered that some malicious code within the SDK works to steal potential revenue from other ad networks the application may be using, and spy on any URL-based request made from within the application.