S. Korean spy agency sought to hack into KakaoTalk: leaked data

July 13, 2015
A woman opens Kakao Talk, a South Korean mobile messaging app with more than 60 million users, on her smartphone in Seoul, South Korea. A handful of smartphone apps that began as basic instant messaging services have amassed several hundred million users in Asia in just a couple of years, mounting a challenge to the popularity of online hangouts such as Facebook as they branch into games, e-commerce, celebrity news and other areas. (AP Photo/Hye Soo Nah)

(AP Photo/Hye Soo Nah)

By Kang Yoon-seung

SEOUL, July 13 (Yonhap) — South Korea’s spy agency made inquiries to a foreign hacking firm last year to seek ways to penetrate the country’s most-popular mobile messenger KakaoTalk, leaked data suggested Monday.

The suspicion came as the whistleblowing website WikiLeaks revealed “1 million searchable e-mails” through its platform that included those exchanged by Italian surveillance malware vendor Hacking Team and an unidentified South Korean entity.

South Korea’s National Intelligence Service refused to comment on the suspicion, but sources said that the unidentified entity dubbed “the 5163 Army Unit” is highly likely to refer to the spy agency.

“They also asked about the progress of Kakao Talk which they mentioned is very commonly used in their country,” one of the leaked documents from Hacking Team showed. The e-mails were exchanged in March 2014.

KakaoTalk, South Korea’s most popular free mobile messenger, has 35 million local users in the country with a population of 50 million.

“We discussed about the issues SKA raised in their ticket, mainly on their concerns about the recent exposure especially when the local news are also highlighting the possibility that the government is using RCS to monitor their own citizens,” Hacking Team also said.

SKA stands for South Korea Army, while RCS refers to Remote Control System technology.

The RCS technology can be used to hack data by installing spyware, allowing hackers to manipulate and track smartphones and computers.

Another email read “I’ve already informed our R&D team of KakaoTalk. In general, we are getting solid results from exploit developers, hopefully we will be able to provide some remote exploits for Android and other platforms in the near future.”

The data also insisted the 5163 Army Division spent 686,410 euros (US$763,013) since 2012 on RCS programs.

Daum Kakao, the messenger’s operator, said its server has never been attacked, adding users are currently safe from any penetration.

“We cannot give comments on only assumptions,” a Daum Kakao official said. “However, we can say that our servers were never attacked.”

“Hackers may, however, intrude the operating systems or device. We ask users to take basic precautionary measures to keep their phones safe,” the official added.

moose knuckles pas cher moose knuckles pas cher moose knuckles pas cher moose knuckles pas cher moose knuckles pas cher moose knuckles outlet moose knuckles outlet moose knuckles outlet moose knuckles outlet moose knuckles outlet maillot de foot pas cher maillot de foot pas cher maillot de foot pas cher maillot de foot pas cher maillot de foot pas cher scarpe nike air max outlet scarpe nike air max outlet scarpe nike air max outlet scarpe nike air max outlet scarpe nike air max outlet scarpe nike air max outlet nike tn pas cher nike tn pas cher nike tn pas cher nike tn pas cher air max pas cher air max pas cher stone island outlet stone island outlet stone island outlet stone island outlet stone island outlet stone island outlet barbour pas cher barbour pas cher barbour pas cher barbour pas cher barbour pas cher nike tn squalo nike air max outlet mcm outlet online moose knuckles outlet happiness outlet happiness outlet shoes