
UC Browser (UCWeb Inc.) is a mobile web browser with a large market share in China, and India. It has versions for most of the popular mobile devices. As of 2015, they claim to support over 3,000 models of cell phone devices. The browser tunnels your web traffic via the UCWeb servers located in China. They claim that their compression of web data improves download speeds and reduces data usage charges for customers. The Incognito mode allows user web surfing to evade firewall filtering. This article analyses UC Browser Incognito mode traffic to their UCloud from an Android smart phone, and the stand-alone PC version. The company is affiliated with TaoBao, and the parent company is Alibaba.
Many mobile apps include access to your pictures and other media on the phone, camera, and microphone, device ID and call information, identity, other.
Go to the options menu, and choose "Encrypt with UCloud".
Here I am browsing to www.craigslist.com.
Here you can see a few representative samples of traffic collected from the application.
This application is collecting data from the application and sending it back to a UCWeb domain.
Most of the application traffic passes through proxy servers hosted by a company called MileWeb (www.mileweb.com). The traffic to the server seems to be encrypted. The traffic coming from the server HTTP Chunk (Transfer) Encoded. I was not able to decode the encrypted traffic in either direction. After de-chunking the servers traffic, it appears to be using compression format called TTComp archive data. However it did not decode as such, so may be a proprietary compression format.
To block this traffic, enable the following Dell SonicWALL Application signatures:
To block unknown encrypted traffic communications from your network, enable the following:
Share This Article

An Article By
An Article By
Security News
Security News