Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Mobile Security

Inside a Mobile App’s Data Overreach: What Our Phia Safari Extension Analysis Reveals

Cyberinchief by Cyberinchief
November 20, 2025
Reading Time: 7 mins read
0
Inside a Mobile App’s Data Overreach: What Our Phia Safari Extension Analysis Reveals


Mobile apps collect more data than most users expect. Developers race to personalize experiences, train AI models and optimize revenue. That pressure pushes many apps to grab as much behavioral data as possible.

RELATED POSTS

Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026

Emerging Technology Management for Modern IT Leaders

Adopting Blueprints in Jamf Tools

During a recent NowSecure investigation, we analyzed the AI-powered Phia iOS shopping app and discovered how quickly helpful features can turn into invasive data overreach. With one permission prompt, the app’s Safari extension gained the ability to inject code across thousands of sites, monitor browsing activity and gather signals from the device itself.

For enterprises, this trend creates serious privacy, compliance and security exposure. Before teams build or approve the next app, they need visibility into what those apps actually collect and how they operate under the hood. Phia is a fast-growing shopping app that helps users compare prices across thousands of retail and resale sites.

A Real-World Example of Data Overreach

To show how this plays out in the real world, we dug into the linked iOS Safari Web extension bundled with the upstart Phia mobile shopping app. Our analysis uncovered aggressive data collection practices that mirror — and in some cases, exceed — the capabilities previously identified in Chrome extension analysis.

The iOS application exhibits similar concerning characteristics. The app injects JavaScript, enables persistent tracking and can collect sensitive data across a wide range of websites depending on how users configure it.Below is a breakdown of what we found. You can find the complete analysis artifacts here.


Mobile apps now collect far more data than users realize — and the gap keeps widening.

Chrome Extension Summary

Security researcher Maahir Sharma documented that the Phia Desktop Chrome extension madeGraphQL calls to logCompleteHtmlToGcs, sending  GZIP-compressed HTML content of every visited page to Google Cloud Storage. The API payload structure confirmed this behavior.

The extension’s background.js contained a function that executed this logging behavior on every tab visit, effectively creating a complete browsing history archive inside Phia’s cloud infrastructure.

Buy JNews
ADVERTISEMENT

iOS Safari Extension Analysis

Our analysis shows the Safari Web Extension bundled with the iOS app has capabilities nearly identical to the Chrome extension. We based this conclusion on static analysis of the extension’s manifest.json (which uses the WebExtensions format, with some iOS  differences) and dynamic analysis of the running application.

Manifest Comparison

Manifest Area Chrome Behavior Safari iOS Behavior Technical Implications
content_scripts.matches ; grants injection on every URL Safari prompts the user; once granted, scripts run on every navigation Full DOM access of all granted websites
content_scripts.world Executes in the page context Safari honors MAIN world injection on iOS 15+ Scripts share the page’s JS heap, enabling credential access
background.scripts Event pages wake on messages Safari converts background scripts to event handlers via SFExtensionManager Persistence through host app even when Safari closed
Inside a Mobile App’s Data Overreach- What Our Phia Safari Extension Analysis Reveals image 1
Inside a Mobile App’s Data Overreach- What Our Phia Safari Extension Analysis Reveals image 2
Safari prompts users to ‘Always Allow’ the extension, opening the door to full website browsing visibility.
Inside a Mobile App’s Data Overreach- What Our Phia Safari Extension Analysis Reveals image 3
Inside a Mobile App’s Data Overreach- What Our Phia Safari Extension Analysis Reveals image 4
Captured browsing data shows a user’s banking login URL, including sensitive URL parameters.
Inside a Mobile App’s Data Overreach- What Our Phia Safari Extension Analysis Reveals image 5
Captured data shows the full Amazon URL, illustrating the scope of the extension’s visibility.

Server-Side Whitelist

During use, the Safari extension loads a whitelist.json file containing two lists: 

  • Exclusions: ~ 60 domains, largely to email and banking providers
  • Whitelist:  ~29,000 retail and shopping sites with corresponding URL patterns. 

Despite the attempt to create a whitelist with both exclusions and allowed domains, the application still collected data from sites not explicitly approved, and it’s unclear whether this behavior was intentional. Either way, it results in the collection of more sensitive data than most users would expect.

Key Security Observations from Manifest

  1. Four separate scripts run on every allowed page, one in MAIN world (reduced isolation).
  2. The extension uses Manifest V2, which Chrome deprecated but Safari still supports.
  3. A permissive Content Security Policy allows unsafe-eval, enabling execution of arbitrary code.
  4. web_accessible_resources exposes all extension files ("*") to websites, allowing potential user anonymization.
  5. A native app bridge enables communication from web content → extension → native iOS app.
  6. Combined permissions (webRequest + cookies + ) provide network metadata and cookie visibility across every granted site.

Full analysis of the manifest is available here.

iOS App Observations

Fingerprinting installed apps

The Phia app’s Info.plist declares intent to query 78 URL schemes associated with common retail and shopping apps:

Inside a Mobile App’s Data Overreach- What Our Phia Safari Extension Analysis Reveals image 6

On startup, system logs show the app attempts to load as many of these schemes as iOS permits, likely to fingerprint which shopping apps users installed:

Inside a Mobile App’s Data Overreach- What Our Phia Safari Extension Analysis Reveals image 7

App Transport Security Settings

iOS enforces secure network transport by default through strict TLS requirements. The Phia app disables these protections globally in its Info.plist, removing Apple’s default safeguards for network traffic: 

Inside a Mobile App’s Data Overreach- What Our Phia Safari Extension Analysis Reveals image 8

Why This Matters for CISOs & AppSec Leaders

This analysis shows how a single free app can gain deep visibility into a user’s browsing activity, device behavior and network patterns. As mobile apps and extensions grow more powerful, the gap between what users expect and what apps actually collect continues to widen.

Enterprises need stronger visibility, clearer guardrails and automated mobile application security testing and privacy testing to safeguard the expanding attack surface. Mobile app risk isn’t hypothetical — it affects every organization that makes or uses mobile apps.

Take the next step and discover how NowSecure helps mobile AppSec and DevSecOps teams detect data overreach and secure the apps they build and deploy.

Special thanks to Dawn Isabel for contributing to this analysis.





Source link

Tags: AnalysisAppsdataExtensionMobileOverreachPhiaRevealsSafari
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
Mobile Security

Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026

January 21, 2026
Emerging Technology Management for Modern IT Leaders
Mobile Security

Emerging Technology Management for Modern IT Leaders

December 8, 2025
Adopting Blueprints in Jamf Tools
Mobile Security

Adopting Blueprints in Jamf Tools

December 8, 2025
Jamf Safe Internet + On-Device Phishing AI
Mobile Security

Jamf Safe Internet + On-Device Phishing AI

December 7, 2025
Act on Jamf Protect Alerts
Mobile Security

Act on Jamf Protect Alerts

December 7, 2025
Terraform + GitLab CI/CD for Jamf
Mobile Security

Terraform + GitLab CI/CD for Jamf

December 6, 2025
Next Post
What Is a SOC? | Functions, Tools, and Benefits Explained

What Is a SOC? | Functions, Tools, and Benefits Explained

How To Draw Cyber Security Drawing easy || Computer security day poster chart project making #cyber

How To Draw Cyber Security Drawing easy || Computer security day poster chart project making #cyber

Recommended Stories

Cyber Crime Bank Account Freeze Telugu | Cyber Cell Hold | Bank Account

Cyber Crime Bank Account Freeze Telugu | Cyber Cell Hold | Bank Account

November 23, 2025
How to Connect Ethernet – Secure, Fast & Reliable Network Setup

How to Connect Ethernet – Secure, Fast & Reliable Network Setup

December 4, 2025
Teaser – CyberSecurity! Stay Safe! with Sangeet Chopra #trending #viral #cybersecurity #ai #alert

Teaser – CyberSecurity! Stay Safe! with Sangeet Chopra #trending #viral #cybersecurity #ai #alert

November 20, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested