The article reports on the discovery of malware in Pinduoduo, a Chinese e-commerce platform. Here are some key points from the article:
**Malware Discovery**
* The malware was discovered by Dark Navy, a Chinese cybersecurity firm, in late February 2023.
* The report claimed that Pinduoduo's app contained malware that could spy on users' locations, contacts, calendars, notifications, and photo albums without their consent.
**Exploits and Permissions**
* The malware used exploits to access sensitive information from users' devices.
* The app requested a large number of permissions beyond the normal functions of a shopping app.
* Experts reported that the malware could be reactivated after Pinduoduo removed it from its app store.
**Regulatory Oversight Failure**
* The Chinese Ministry of Industry and Information Technology failed to detect the malware despite regular sweeps for apps violating user data regulations.
* The Cyberspace Administration of China did not take any action against Pinduoduo.
**Consequences for Pinduoduo**
* A core group of 20 cybersecurity engineers who specialize in finding vulnerabilities remained at Pinduoduo after the malware was removed.
* Most team members were transferred to work on Temu, a subsidiary of Pinduoduo.
**Expert Opinions**
* Kendra Schaefer, a tech policy expert, stated that regulators should have detected the malware and called it embarrassing for them.
* A cybersecurity expert with 1.8 million followers wrote on Weibo that regulators cannot understand coding and programming, making it difficult to detect malicious code.
**Censorship**
* The original post by the cybersecurity expert was censored the next day.
The article highlights concerns about regulatory oversight in China and the lack of awareness among regulators regarding cybersecurity issues. It also underscores the importance of effective monitoring and enforcement of data protection regulations.
**Malware Discovery**
* The malware was discovered by Dark Navy, a Chinese cybersecurity firm, in late February 2023.
* The report claimed that Pinduoduo's app contained malware that could spy on users' locations, contacts, calendars, notifications, and photo albums without their consent.
**Exploits and Permissions**
* The malware used exploits to access sensitive information from users' devices.
* The app requested a large number of permissions beyond the normal functions of a shopping app.
* Experts reported that the malware could be reactivated after Pinduoduo removed it from its app store.
**Regulatory Oversight Failure**
* The Chinese Ministry of Industry and Information Technology failed to detect the malware despite regular sweeps for apps violating user data regulations.
* The Cyberspace Administration of China did not take any action against Pinduoduo.
**Consequences for Pinduoduo**
* A core group of 20 cybersecurity engineers who specialize in finding vulnerabilities remained at Pinduoduo after the malware was removed.
* Most team members were transferred to work on Temu, a subsidiary of Pinduoduo.
**Expert Opinions**
* Kendra Schaefer, a tech policy expert, stated that regulators should have detected the malware and called it embarrassing for them.
* A cybersecurity expert with 1.8 million followers wrote on Weibo that regulators cannot understand coding and programming, making it difficult to detect malicious code.
**Censorship**
* The original post by the cybersecurity expert was censored the next day.
The article highlights concerns about regulatory oversight in China and the lack of awareness among regulators regarding cybersecurity issues. It also underscores the importance of effective monitoring and enforcement of data protection regulations.