3 min read
[AI Minor News]

NetEase's Android Emulator 'MuMu Player Pro' Secretly Running Recon Every 30 Minutes on macOS


MuMu Player Pro has been found executing 17 commands every half hour on macOS to gather detailed information about networks and processes.

※この記事はアフィリエイト広告を含みます

[AI Minor News Flash] NetEase’s Android Emulator ‘MuMu Player Pro’ Secretly Running Recon Every 30 Minutes on macOS

📰 News Summary

  • Hidden Data Collection: MuMu Player Pro (v1.8.5) has been found executing 17 system reconnaissance commands on macOS every 30 minutes while running.
  • Scope of Data Collection: Targeted data includes all devices on the local network, all running processes (including command arguments), all installed applications, host files, kernel parameters, and more.
  • Personal Identification Linkage: The collected data is managed through an analytics platform called “SensorsData,” linked to the hardware serial number of the Mac.

💡 Key Points

  • Privacy Policy Violation: MuMu’s privacy policy does not mention behavior such as retrieving process lists, enumerating local networks, or collecting serial numbers.
  • Unnecessary Permissions for the Emulator: There’s no justification for an Android emulator to collect command arguments of all running processes or the MAC addresses of other devices on the network.
  • Detailed Action Logging: The execution of “ps aux” every 30 minutes creates a detailed timeline of which applications (VPN, chat, development tools, etc.) the user has been using.

🦈 Shark’s Eye (Curator’s Perspective)

This behavior goes beyond being just an emulator; it’s a full-on “system reconnaissance” operation! What’s particularly alarming is that it’s pulling arguments from all processes using “ps aux.” This means session tokens, IDs, and even VPN settings and directory structures can be exposed! Furthermore, scanning the same network for devices using “arp -a” is clearly suspicious. It’s like you’re just trying to run an emulator, but every 30 minutes, your Mac is sending a “status report” to NetEase!

🚀 What’s Next?

Users with a heightened sense of security are likely to stop using MuMu Player and shift to alternative software. This is especially true for those using it on work Macs, as the risk of confidential information leaks could be taken very seriously. In the future, we can expect calls for runtime protections from Apple and an official explanation or fix from NetEase.

💬 A Word from Haru-Same

Beneath the convenience lies a sharp set of fangs! Take a peek into your logs to check if your data is being siphoned off right now! Shark on! 🦈🔥

📚 Glossary

  • Recon Commands: Instructions used to investigate the state of the system, network configuration, and running programs.

  • ps aux: A command in macOS and Linux that displays all currently running processes and their detailed information.

  • arp -a: A command that displays a list of the IP addresses and MAC addresses of other devices connected to the same local network.

  • Source: MuMu Player (NetEase) silently runs 17 reconnaissance commands every 30 minutes

【免責事項 / Disclaimer / 免责声明】
JP: 本記事はAIによって構成され、運営者が内容の確認・管理を行っています。情報の正確性は保証せず、外部サイトのコンテンツには一切の責任を負いません。
EN: This article was structured by AI and is verified and managed by the operator. Accuracy is not guaranteed, and we assume no responsibility for external content.
ZH: 本文由AI构建,并由运营者进行内容确认与管理。不保证准确性,也不对外部网站的内容承担任何责任。
🦈