Skip to content

Unique: Russian software program disguised as American finds its means into US Military, CDC apps

LONDON/WASHINGTON, Nov 14 (Reuters) – 1000’s of smartphone functions in Apple (AAPL.O) and Google’s (GOOGL.O) on-line shops comprise laptop code developed by a know-how firm, Pushwoosh, that presents itself as primarily based in the US , however is definitely Russian, Reuters has discovered.

The Facilities for Illness Management and Prevention (CDC), the US’ primary company for combating main well being threats, stated it had been deceived into believing Pushwoosh was primarily based within the US capital. After studying about its Russian roots from Reuters, it eliminated Pushwoosh software program from seven public-facing apps, citing safety issues.

The US Military stated it had eliminated an app containing Pushwoosh code in March due to the identical issues. That app was utilized by troopers at one of many nation’s primary fight coaching bases.

In keeping with firm paperwork publicly filed in Russia and reviewed by Reuters, Pushwoosh is headquartered within the Siberian city of Novosibirsk, the place it’s registered as a software program firm that additionally carries out information processing. It employs round 40 folks and reported income of 143,270,000 rubles ($2.4 mln) final yr. Pushwoosh is registered with the Russian authorities to pay taxes in Russia.

On social media and in US regulatory filings, nevertheless, it presents itself as a US firm, primarily based at numerous occasions in California, Maryland and Washington, DC, Reuters discovered.

Pushwoosh offers code and information processing assist for software program builders, enabling them to profile the web exercise of smartphone app customers and ship tailored push notifications from Pushwoosh servers.

On its web site, Pushwoosh says it doesn’t acquire delicate info, and Reuters discovered no proof Pushwoosh mishandled person information. Russian authorities, nevertheless, have compelled native firms at hand over person information to home safety companies.

Pushwoosh’s founder, Max Konev, informed Reuters in a September e mail that the corporate had not tried to masks its Russian origins. “I’m proud to be Russian and I might by no means disguise this.”

He stated the corporate “has no reference to the Russian authorities of any sort” and shops its information in the US and Germany.

Cybersecurity consultants stated storing information abroad wouldn’t stop Russian intelligence companies from compelling a Russian agency to cede entry to that information, nevertheless.

Russia, whose ties with the West have deteriorated since its takeover of the Crimean Peninsula in 2014 and its invasion of Ukraine this yr, is a world chief in hacking and cyber-espionage, spying on overseas governments and industries to hunt aggressive benefit, in line with Western Officers.



Pushwoosh code was put in within the apps of a wide selection of worldwide firms, influential non-profits and authorities companies from world shopper items firm Unilever Plc (ULVR.L) and the Union of European Soccer Associations (UEFA) to the politically highly effective US gun foyer, the Nationwide Rifle Affiliation (NRA), and Britain’s Labor Get together.

Pushwoosh’s enterprise with US authorities companies and personal firms may violate contracting and US Federal Commerce Fee (FTC) legal guidelines or set off sanctions, 10 authorized consultants informed Reuters. The FBI, US Treasury and the FTC declined to remark.

Jessica Wealthy, former director of the FTC’s Bureau of Client Safety, stated “such a case falls proper inside the authority of the FTC,” which cracks down on unfair or misleading practices affecting US shoppers.

Washington may select to impose sanctions on Pushwoosh and has broad authority to take action, sanctions consultants stated, together with probably by way of a 2021 govt order that provides the US the flexibility to focus on Russia’s know-how sector over malicious cyber exercise.

Pushwoosh code has been embedded into nearly 8,000 apps within the Google and Apple app shops, in line with Appfigures, an app intelligence web site. Pushwoosh’s web site says it has greater than 2.3 billion units listed in its database.

“Pushwoosh collects person information together with exact geolocation, on delicate and governmental apps, which may permit for invasive monitoring at scale,” stated Jerome Dangu, co-founder of Confiant, a agency that tracks misuse of information collected in internet marketing provide chains.

“We’ve not discovered any clear signal of misleading or malicious intent in Pushwoosh’s exercise, which actually would not diminish the chance of getting app information leaking to Russia,” he added.

Google stated privateness was a “large focus” for the corporate however didn’t reply to requests for feedback about Pushwoosh. Apple stated it takes person belief and security severely however equally declined to reply questions.

Keir Giles, a Russia knowledgeable at London assume tank Chatham Home, stated regardless of worldwide sanctions on Russia, a “substantial quantity” of Russian firms had been nonetheless buying and selling overseas and amassing folks’s private information.

Given Russia’s home safety legal guidelines, “it should not be a shock that with or with out direct hyperlinks to Russian state espionage campaigns, corporations that deal with information will likely be eager to minimize their Russian roots,” he stated.


After Reuters raised Pushwoosh’s Russian hyperlinks with the CDC, the well being company eliminated the code from its apps as a result of “the corporate presents a possible safety concern,” spokesperson Kristen Nordlund stated.

“CDC believed Pushwoosh was an organization primarily based within the Washington, DC space,” Nordlund stated in an announcement. The assumption was primarily based on “representations” made by the corporate, she stated, with out elaborating.

The CDC apps that contained Pushwoosh code included the company’s primary app and others set as much as share info on a variety of well being issues. One was for docs treating sexually transmitted ailments. Whereas the CDC additionally used the corporate’s notifications for well being issues akin to COVID, the company stated it “didn’t share person information with Pushwoosh.”

The Military informed Reuters it eliminated an app containing Pushwoosh in March, citing “safety points.” It didn’t say how broadly the app, which was an info portal to be used at its Nationwide Coaching Middle (NTC) in California, had been utilized by troops.

The NTC is a serious battle coaching heart within the Mojave Desert for pre-deployment troopers, that means an information breach there may reveal upcoming abroad troop actions.

US Military spokesperson Bryce Dubee stated the Military had suffered no “operational lack of information,” including that the app didn’t hook up with the Military community.

Some massive firms and organizations together with UEFA and Unilever stated third events arrange the apps for them, or they thought they had been hiring a US firm.

“We do not have a direct relationship with Pushwoosh,” Unilever stated in an announcement, including that Pushwoosh was faraway from one in all its apps “a while in the past.”

UEFA stated its contract with Pushwoosh was “with a US firm.” UEFA declined to say if it knew of Pushwoosh’s Russian ties however stated it was reviewing its relationship with the corporate after being contacted by Reuters.

The NRA stated its contract with the corporate ended final yr, and it was “not conscious of any points.”

Britain’s Labor Get together didn’t reply to requests for remark.

“The info Pushwoosh collects is just like information that may very well be collected by Fb, Google or Amazon, however the distinction is that each one the Pushwoosh information within the US is shipped to servers managed by an organization (Pushwoosh) in Russia,” stated Zach Edwards , a safety researcher, who first noticed the prevalence of Pushwoosh code whereas working for Web Security Labs, a nonprofit group.

Roskomnadzor, Russia’s state communications regulator, didn’t reply to a request from Reuters for remark.


In US regulatory filings and on social media, Pushwoosh by no means mentions its Russian hyperlinks. The corporate lists “Washington, DC” as its location on Twitter and claims its workplace tackle as a home within the suburb of Kensington, Maryland, in line with its newest US company filings submitted to Delaware’s secretary of state. It additionally lists the Maryland tackle on its Fb and LinkedIn profiles.

The Kensington home is the house of a Russian pal of Konev’s who spoke to a Reuters journalist on situation of anonymity. He stated he had nothing to do with Pushwoosh and had solely agreed to permit Konev to make use of his tackle from him to obtain mail.

Konev stated Pushwoosh had begun utilizing the Maryland tackle to “obtain enterprise correspondence” through the coronavirus pandemic.

He stated he now operates Pushwoosh from Thailand however supplied no proof that it’s registered there. Reuters couldn’t discover a firm by that identify within the Thai firm registry.

Pushwoosh by no means talked about it was Russian-based in eight annual filings within the US state of Delaware, the place it’s registered, an omission which may violate state legislation.

As an alternative, Pushwoosh listed an tackle in Union Metropolis, California as its primary place of job from 2014 to 2016. That tackle doesn’t exist, in line with Union Metropolis officers.

Pushwoosh used LinkedIn accounts purportedly belonging to 2 Washington, DC-based executives named Mary Brown and Noah O’Shea to solicit gross sales. However neither Brown nor O’Shea are actual folks, Reuters discovered.

The one belonging to Brown was really of an Austria-based dance trainer, taken by a photographer in Moscow, who informed Reuters she had no concept the way it ended up on the location.

Konev acknowledged the accounts weren’t real. He stated Pushwoosh employed a advertising and marketing company in 2018 to create them in an try to make use of social media to promote Pushwoosh, to not masks the corporate’s Russian origins.

LinkedIn stated it had eliminated the accounts after being alerted by Reuters.

Reporting by James Pearson in London and Marisa Taylor in Washington Further reporting by Chris Bing in Washington, modifying by Chris Sanders and Ross Colvin

Our Requirements: The Thomson Reuters Belief Ideas.


Leave a Reply

Your email address will not be published. Required fields are marked *