this post was submitted on 18 Sep 2024
12 points (100.0% liked)

Ask Lemmy

26903 readers
1662 users here now

A Fediverse community for open-ended, thought provoking questions

Please don't post about US Politics. If you need to do this, try !politicaldiscussion@lemmy.world


Rules: (interactive)


1) Be nice and; have funDoxxing, trolling, sealioning, racism, and toxicity are not welcomed in AskLemmy. Remember what your mother said: if you can't say something nice, don't say anything at all. In addition, the site-wide Lemmy.world terms of service also apply here. Please familiarize yourself with them


2) All posts must end with a '?'This is sort of like Jeopardy. Please phrase all post titles in the form of a proper question ending with ?


3) No spamPlease do not flood the community with nonsense. Actual suspected spammers will be banned on site. No astroturfing.


4) NSFW is okay, within reasonJust remember to tag posts with either a content warning or a [NSFW] tag. Overtly sexual posts are not allowed, please direct them to either !asklemmyafterdark@lemmy.world or !asklemmynsfw@lemmynsfw.com. NSFW comments should be restricted to posts tagged [NSFW].


5) This is not a support community.
It is not a place for 'how do I?', type questions. If you have any questions regarding the site itself or would like to report a community, please direct them to Lemmy.world Support or email info@lemmy.world. For other questions check our partnered communities list, or use the search function.


Reminder: The terms of service apply here too.

Partnered Communities:

Tech Support

No Stupid Questions

You Should Know

Reddit

Jokes

Ask Ouija


Logo design credit goes to: tubbadu


founded 1 year ago
MODERATORS
 

On quite a few news websites there's a new hot topic how the Australian "Ghost" app got hacked by Interpol and has led to prevention of murders and resulted in a few arrests.

Is there any information out there on what security methods Ghost used and how it was exploited?

top 6 comments
sorted by: hot top controversial new old
[–] dohpaz42@lemmy.world 4 points 2 months ago
[–] slazer2au@lemmy.world 4 points 2 months ago

Very likely the Aussie police won't say exactly. All they have said so far is the devices are modified smart phones and they compromised the devices with a supply chain attack.

https://www.afp.gov.au/news-centre/media-release/afp-operation-kraken-charges-alleged-head-global-organised-crime-app

Main parts

The handsets, which were a modified smart phone, were sold for about $2350, which included a six-month subscription to an encrypted network and tech support.

The administrator regularly pushed out software updates, just like the ones needed for normal mobile phones.

But the AFP was able to modify those updates, which basically infected the devices, enabling the AFP to access the content on devices in Australia.

[–] Brkdncr@lemmy.world 2 points 2 months ago (2 children)

Isn’t that the one that they built on their own?

[–] fraksken@infosec.pub 3 points 2 months ago (1 children)

What? Like "I'lL mAkE mY oWn EnCrYpTiOn"?

The administrator (creator) aledgedly created the platform 9 years ago when he was 23...

[–] Brkdncr@lemmy.world 1 points 2 months ago

Actually I’m thinking of Phantom Secure. They built phones to go along with their app services.

[–] Brkdncr@lemmy.world 1 points 2 months ago

No, it was built by three-letter agencies and used to spy on cartels and others.