{"id":23043,"date":"2018-12-20T13:44:35","date_gmt":"2018-12-20T13:44:35","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29648\/Two-Android-Apps-Used-In-Combat-By-US-Troops-Contained-Severe-Vulnerabilities.html"},"modified":"2018-12-20T13:44:35","modified_gmt":"2018-12-20T13:44:35","slug":"two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\/","title":{"rendered":"Two Android Apps Used In Combat By US Troops Contained Severe Vulnerabilities"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2018\/12\/20\/26faad76-2b65-460e-b95f-b782dd03df0e\/db62007e28510bda123746830aac5eca\/kilswitch-app.jpg\" class=\"\" alt=\"kilswitch-app.jpg\"\/><\/span><span class=\"credit\">Image: DARPA<\/span><\/p>\n<p>US military troops used two Android apps that contained severe vulnerabilities in live combat scenarios, a Navy Inspector General report revealed today.<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More security news<\/span><\/h3>\n<\/div>\n<p>The two apps are named KILSWITCH (Kinetic Integrated Low-Cost Software Integrated Tactical Combat Handheld) and APASS (Android Precision Assault Strike Suite).<\/p>\n<p>Both apps work by showing satellite imagery of surroundings, including objectives, mission goals, nearby enemy and friendly forces.<\/p>\n<p>The two apps work as a modern-day replacement for radios and paper maps and allow troops to use a real-time messaging client to coordinate with other military branches, and even call in air-strike support with a few simple screen taps, according to a <a href=\"https:\/\/web.archive.org\/web\/20150430145146\/http:\/\/www.darpa.mil\/NewsEvents\/Releases\/2015\/04\/06.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">DARPA press release<\/a> and accompanying YouTube video.<\/p>\n<p>The apps have been under development since 2012 and <a href=\"https:\/\/www.marines.mil\/News\/News-Display\/Article\/624674\/marines-use-tablet-technology-to-advance-war-fighting-skills\/\" target=\"_blank\" rel=\"noopener noreferrer\">starting 2015<\/a>, they have been made generally available to all US troops via a <a href=\"https:\/\/apps.nga.mil\/Home\/Store\" target=\"_blank\" rel=\"noopener noreferrer\">public app store<\/a> managed by the National Geospatial-Intelligence Agency.<\/p>\n<p>But according to a Navy Inspector General <a href=\"https:\/\/www.scribd.com\/document\/396040628\/DI-17-3391\" target=\"_blank\" rel=\"noopener noreferrer\">report<\/a> from March that was made public today, both apps contained vulnerabilities that could have allowed enemy forces access to troops&#8217; information.<\/p>\n<p>The heavily redacted report doesn&#8217;t detail the nature of the two vulnerabilities, but it does point out that the Navy had failed to control the distribution of these two applications, and later failed to act in warning troops of the danger they were in for almost a year.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The report says that the two apps, KILSWITCH and APASS, were never meant or approved to be deployed in live combat zones.<\/p>\n<p>&#8220;Cybersecurity was not a concern for the [apps&#8217;] developers,&#8221; the report said, because developers initially expected the apps to be used for <a href=\"https:\/\/www.onr.navy.mil\/en\/Media-Center\/Press-Releases\/2017\/KILSWITCH-SDZ-Mapping-Tool\" target=\"_blank\" rel=\"noopener noreferrer\">troop training and military exercises<\/a> primarily.<\/p>\n<p>But the two apps, because of their flashy features and easier to use interface, became wildly popular among US troops, but also other military branches, including foreign allied forces.<\/p>\n<p>The Navy Inspector General said the Navy failed to advise troops about the nature of these two apps. Auditors said the Navy and other military branches should have advised troops against using KILSWITCH and APASS in combat zones, where they should have used another app named <a href=\"https:\/\/atakmap.com\/p_questions.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">ATAK<\/a> (Android Tactical Assault Kit), which had been thoroughly tested and approved by the US Department of Defense for war zones.<\/p>\n<p>The Navy Inspector General credits a whistleblower&#8217;s persistent efforts for surfacing these two vulnerabilities. While the whistleblower&#8217;s name is redacted, the report is about Anthony Kim.<\/p>\n<p>Kim&#8217;s case is somewhat notorious in military circles. According to a <a href=\"https:\/\/freebeacon.com\/national-security\/mapping-apps-endangering-special-operators\/\" target=\"_blank\" rel=\"noopener noreferrer\">report<\/a> from the <em>Washington Free Beacon<\/em> from earlier this year, Kim worked as a civilian program analyst for the Naval Air Warfare Center Weapons Division (NAWCWD), one of the two military divisions who co-developed and promoted the KILSWITCH app.<\/p>\n<p>The Free Beacon, citing Kim&#8217;s lawyer, says Kim discovered the KILSWITCH and APASS vulnerabilities last year, in March 2017, and notified his direct supervisors, only to be ignored.<\/p>\n<p>When Kim continued to raise the issue about the two vulnerabilities with the civilian leadership of the military base where he worked &#8211;the Naval Air Weapons Station in China Lake, California&#8211; he was told to &#8220;stop discussing DPSS in any disparaging way.&#8221;<\/p>\n<p>DPSS stands for Digital Precision Strike Suite, a private-owned military contractor that was involved in the creation of the two applications.<\/p>\n<p>Kim&#8217;s lawyer says the army&#8217;s civilian leadership then reduced his client&#8217;s pay as a warning for insisting on raising concerns about the two vulnerabilities.<\/p>\n<p>However, Kim didn&#8217;t give up, and he reported the vulnerabilities to Navy high officials via the Pentagon&#8217;s whistleblower program. Kim&#8217;s lawyer says that a month after the Navy Inspector General started an investigation into Kim&#8217;s complaint the army base&#8217;s management put him on leave, suspended his pay, and withdrew his security clearance.<\/p>\n<p>Now, more than a year after Kim&#8217;s complaint, investigators have sided with Kim in this dispute.<\/p>\n<p>&#8220;Thanks to a brave whistleblower who spoke up, the Navy is now taking the cyber threat posed by these apps seriously and ensuring security measures are in place,&#8221; said Special Counsel Henry J. Kerner of the US Office of Special Counsel.<\/p>\n<p>&#8220;I strongly commend [REDACTED] for his public service in this matter,&#8221; Kerner added, in a <a href=\"https:\/\/www.scribd.com\/document\/396040653\/DI-17-3391-letter\" target=\"_blank\" rel=\"noopener noreferrer\">letter<\/a> sent to the White House. &#8220;By filing this disclosure, he exposed a serious issue that potentially endangered the physical safety of forward-deployed military personnel.&#8221;<\/p>\n<p>&#8220;This software was widely distributed across [REDACTED], many of whom used it in combat. [REDACTED] should be lauded for his determination to protect the safety and wellbeing of military personnel who risk their lives to protect the United States,&#8221; Kerner said.<\/p>\n<p>But besides lauding Kim for his actions, the same White House letter is far more harsh towards NAWCWD officials, claiming they&#8217;ve intentionally misled DOD officials about the app&#8217;s security, which led to &#8220;untested software&#8221; reaching combat front-lines.<\/p>\n<p>Kim&#8217;s comments, as cited in the White House letter, claimed the apps &#8220;were marketed and showcased to secure political and capital gains for NAWCWD, with little regard for the consequences of rolling out vulnerable software to units that would rely on it in combat.&#8221;<\/p>\n<p>Following the completion of the Navy Inspector General report in March, the Navy sent out an <a href=\"https:\/\/www.marines.mil\/News\/Messages\/Messages-Display\/Article\/1557686\/reiteration-of-the-appropriate-use-of-the-kintetic-integrated-low-cost-software\/\" target=\"_blank\" rel=\"noopener noreferrer\">official warning<\/a> to troops in June this year, advising military personnel to stop using the two apps in combat zones. DOD officials also reinstated Kim&#8217;s security clearance and allowed him to return to work.<\/p>\n<h3>More cybersecurity news:<br \/><\/h3>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29648\/Two-Android-Apps-Used-In-Combat-By-US-Troops-Contained-Severe-Vulnerabilities.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":23044,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[5290],"class_list":["post-23043","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentusaflawcyberwargoogle"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Two Android Apps Used In Combat By US Troops Contained Severe Vulnerabilities 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Two Android Apps Used In Combat By US Troops Contained Severe Vulnerabilities 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-20T13:44:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"430\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Two Android Apps Used In Combat By US Troops Contained Severe Vulnerabilities\",\"datePublished\":\"2018-12-20T13:44:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\\\/\"},\"wordCount\":916,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities.jpg\",\"keywords\":[\"headline,government,usa,flaw,cyberwar,google\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\\\/\",\"name\":\"Two Android Apps Used In Combat By US Troops Contained Severe Vulnerabilities 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities.jpg\",\"datePublished\":\"2018-12-20T13:44:35+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities.jpg\",\"width\":1000,\"height\":430},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,usa,flaw,cyberwar,google\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentusaflawcyberwargoogle\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Two Android Apps Used In Combat By US Troops Contained Severe Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Two Android Apps Used In Combat By US Troops Contained Severe Vulnerabilities 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Two Android Apps Used In Combat By US Troops Contained Severe Vulnerabilities 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-12-20T13:44:35+00:00","og_image":[{"width":1000,"height":430,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Two Android Apps Used In Combat By US Troops Contained Severe Vulnerabilities","datePublished":"2018-12-20T13:44:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\/"},"wordCount":916,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities.jpg","keywords":["headline,government,usa,flaw,cyberwar,google"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\/","url":"https:\/\/www.threatshub.org\/blog\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\/","name":"Two Android Apps Used In Combat By US Troops Contained Severe Vulnerabilities 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities.jpg","datePublished":"2018-12-20T13:44:35+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities.jpg","width":1000,"height":430},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,usa,flaw,cyberwar,google","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentusaflawcyberwargoogle\/"},{"@type":"ListItem","position":3,"name":"Two Android Apps Used In Combat By US Troops Contained Severe Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/23043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=23043"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/23043\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/23044"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=23043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=23043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=23043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}