• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 20th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Surveillance
NSA

NSA Planned To Hack Google App Store And Install Malware On All Android Apps

May 22nd, 2015 Waqas NSA 0 comments
NSA Planned To Hack Google App Store And Install Malware On All Android Apps
Share on FacebookShare on Twitter

As per the latest documents provided by Edward Snowden, the NSA developed a program called IRRITANT HORN for delivering malware via Samsung and Google app stores.

Edward Snowden has exposed another plan of the National Security Agency/NSA in which the agency had devised a program for spreading malware by intercepting web traffic across mobile application servers. The document was published Wednesday by CBC News in collaboration with The Intercept.

This program was dubbed as IRRITANT HORN and the malware was to be delivered through Samsung and Google app stores.

nsa-google-app-store-hack-android-apps-malware

One of the two slides shows Samsung’s update protocol whereas the other displays the Google Play servers that are based in France. These servers were apparently used for delivering updates to mobile phones all over northern Africa.

The agencies used the Internet spying system XKEYSCORE to identify smartphone traffic flowing across Internet cables and then to track down smartphone connections to app marketplace servers operated by Samsung and Google. (Google declined to comment for this story. Samsung said it would not be commenting “at this time,”) according to The Intercept.

The NSA could easily intercept traffic before it reached the servers if the route to those servers was created. Then, the NSA would have injected malware to certain users using a man-in-the-middle attack.

The files will be assumed to be coming from a reliable app store but actually these would be coming from the NSA so that the agency could deliver spying tools from its highly extensive database of surveillance devices. For instance, NSA could easily acquire a user’s contact list or obtain his location in real-time.

TLS encryption is employed by both Google and Samsung for ensuring protection against man-in-the-middle attacks but cryptographers have always believed that the NSA had developed or obtained the technology to break or circumvent these security barriers.

The document was created between November 2011 and February 2012 and it is not clear if this plan was actually implemented by the NSA. However, it displays that the NSA has an abiding interest in breaking the protective layers to obtain user data and to spread malware to targeted devices.

[src src=”via” url=”https://firstlook.org/theintercept/2015/05/21/nsa-five-eyes-google-samsung-app-stores-spyware/”]TheIntercept[/src]

[src src=”source” url=”http://www.cbc.ca/news/canada/spy-agencies-target-mobile-phones-app-stores-to-implant-spyware-1.3076546″]CBA News[/src]

  • Tags
  • Android
  • Google
  • Google App Store
  • hacking
  • NSA
  • PRISM
  • Privacy
  • security
  • Snowden
  • Surveillance
  • XKeyscore
Facebook Twitter LinkedIn Pinterest
Previous article FBI chief fears ISIS gearing up for cyberattacks on US, claims “it's coming”
Next article Massive US Healthcare Company Hacked, 1.1 million customers affected
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
Download NSA's reverse engineering tool GHIDRA

Download NSA's reverse engineering tool GHIDRA

Polar fitness app exposed location data of users in military & airbases

Polar fitness app exposed location data of users in military & airbases

Fileless WannaMine Cryptojacking Malware Using NSA Exploit

Fileless WannaMine Cryptojacking Malware Using NSA Exploit

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Hackers compromised IObit forum to spread DeroHE ransomware
Hacking News

Hackers compromised IObit forum to spread DeroHE ransomware

70
X-rated social media app Fleek exposed explicit photos of users
Leaks

X-rated social media app Fleek exposed explicit photos of users

88
Top learning management system (LMS) software for small businesses
Technology News

Top learning management system (LMS) software for small businesses

584

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us