Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site.... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

News Flash

Hijacked maps: a gps app just exposed the Kremlin’s military secrets

A cracked version of AlpineQuest Pro used by Russian soldiers was infected with malware leaking live locations and sensitive documents

An entire army

Table of contents

  • A hiking app turned into a cyber weapon
  • The hidden malware that spied on soldiers
  • Russia caught in its own trap
  • Digital warfare is the new frontline

A hiking app turned into a cyber weapon

AlpineQuest, a popular topographic gps app, just turned the tide in the Russia-Ukraine cyber war. A trojanized version of the app, promoted as a cracked, ad-free AlpineQuest Pro, was downloaded by Russian soldiers, unknowingly installing a dangerous Android malware.

In fact, they were opening the doors of smartphones and tablets to an Android malware that started working in the shadows.

Hackers spread the counterfeit app on Telegram and alternative Russian app stores, knowing full well how Kremlin troops used it for mission planning in war zones. And the plan worked to perfection.

The hidden malware that spied on soldiers

Once installed, the fake app began collecting sensitive data, including:

  • Live location data of troops;
  • Confidential documents shared via Telegram and WhatsApp;
  • Possibly classified military strategies.

Doctor Web, the cyber security firm that uncovered the malware, confirmed its ability to send this intel directly to unknown attackers.

Russia caught in its own trap

What is striking is the paradox: Russia has fallen victim to the same strategy it has often used against its enemies. Indeed, in the past, Russian cyber criminals have launched malware to target Ukrainian communications, gaining decisive tactical advantages.

But this time, the roles were reversed: the ones who paid the price for blind trust in the “free version” of an app were the ones fighting on the ground.

Digital warfare is the new frontline

This episode shows that cyber intelligence is now one of the main fronts in modern conflicts. A simple app can become the pick to infiltrate the military secrets of an entire army.

And with the increasing use of mobile devices in the armed forces, digital security becomes as important a weapon as tanks.

To top