Breaking News

IRRITANT HORN – NSA plan to Hijack Google Play Store to serve spyware

A new top-secret document leaked by Snowden revealed how the NSA and its allies planned to target Android platforms under the project IRRITANT HORN.

New top-secret documents leaked by the whistleblower Edward Snowden revealed that the NSA and its allies of the Five Eyes group (United States, United Kingdom, Canada, New Zealand and Australia) planned to hijack Google and Samsung app stores in order to serve spyware on Android devices.

The surveillance operation was organized by members of the Network Tradecraft Advancement Team, composed by experts and cyber spies from the Five Eyes intelligence alliance.

The new collection of documents was leaked online by The Intercept in collaboration with journalists at CBC News, the files revealed a joint effort of the intelligence agencies to exploit vulnerabilities in the mobile browsers for the purpose of surveillance .

“Canada and its spying partners exploited weaknesses in one of the world’s most popular mobile browsers and planned to hack into smartphones via links to Google and Samsung app stores, a top secret document obtained by CBC News shows.” states the post published by CBC News.

The documents revealed the existence of a secret project IRRITANT HORN, conducted by the Network Tradecraft Advancement Team under the control of the agencies belonging the Five Eyes alliance.

The goal of the IRRITANT HORN was to compromise servers behind the official Google and Samsung app stores in order to distribute surveillance malware on the victim’s smartphone.

The idea behind the Irritant Horn project is very simple, cyber spies wanted to serve spyware on mobile devices running man-in-the-middle attacks to inject malicious data transmitting between the App store servers and the end-user mobile device. The malware implanted with this technique allows the intelligence agencies to control user’s devices and exfiltrate data from it.

The documents refer to the activities conducted by the Network Tradecraft Advancement Team during the workshops held in Canada and Australia between November 2011 and February 2012.

The documents also revealed that cyber spies used the hacking platform “XKeyScore” for the selection of targets, the intelligence was able to identify victims by combining the data on their mobile devices with their online activities.

According to the documents leaked by Snowden the NSA and its allies were focused on the exploitation of privacy vulnerabilities in the popular mobile Internet browsers UC Browser. The choice of the UC Browser is not casual, the application is used by more than half a Billion individuals in China and India.

The hackers working for the intelligence exploited the flaws in the UC Browser to monitor activities of mobile devices used by suspected terrorists and other persons of interest.

The experts at the technology research group in Toronto, Citizen Lab, confirmed that the presence of several “major security and privacy issues” in the English and Chinese editions of the UC Browsers, it is easy to imagine how the flaws were exploited by the attackers to target potentially million users.

Of course, the user of this application has no idea that this is going on,” says Ron Deibert, director of the Citizen Lab. “They just assume when they open a browser that the browser’s doing what it should do. But, in fact, it’s leaking all this information.

The problem is that the flaws affecting the US Browser could be exploited also by criminal crews worldwide to harvest users’ personal data for years.
By keeping secret security flaws in computing systems and mobile devices, the intelligence agencies were exposing citizens to a risk of cyber attacks.

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, NSA Surveillance, Project IRRITANT HORN)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

North Korea-linked APT groups target South Korean defense contractors

The National Police Agency in South Korea warns that North Korea-linked threat actors are targeting…

3 hours ago

U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity

The U.S. Department of State imposed visa restrictions on 13 individuals allegedly linked to the…

14 hours ago

A cyber attack paralyzed operations at Synlab Italia

A cyber attack has been disrupting operations at Synlab Italia, a leading provider of medical…

15 hours ago

Russia-linked APT28 used post-compromise tool GooseEgg to exploit CVE-2022-38028 Windows flaw

Russia-linked APT28 group used a previously unknown tool, dubbed GooseEgg, to exploit Windows Print Spooler…

1 day ago

Hackers threaten to leak a copy of the World-Check database used to assess potential risks associated with entities

A financially motivated group named GhostR claims the theft of a sensitive database from World-Check…

1 day ago

Windows DOS-to-NT flaws exploited to achieve unprivileged rootkit-like capabilities

Researcher demonstrated how to exploit vulnerabilities in the Windows DOS-to-NT path conversion process to achieve…

1 day ago

This website uses cookies.