On quite a few news websites there’s a new hot topic how the Australian “Ghost” app got hacked by Interpol and has led to prevention of murders and resulted in a few arrests.

Is there any information out there on what security methods Ghost used and how it was exploited?

  • slazer2au@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    3 months ago

    Very likely the Aussie police won’t say exactly. All they have said so far is the devices are modified smart phones and they compromised the devices with a supply chain attack.

    https://www.afp.gov.au/news-centre/media-release/afp-operation-kraken-charges-alleged-head-global-organised-crime-app

    Main parts

    The handsets, which were a modified smart phone, were sold for about $2350, which included a six-month subscription to an encrypted network and tech support.

    The administrator regularly pushed out software updates, just like the ones needed for normal mobile phones.

    But the AFP was able to modify those updates, which basically infected the devices, enabling the AFP to access the content on devices in Australia.

    • fraksken@infosec.pubOP
      link
      fedilink
      arrow-up
      1
      ·
      3 months ago

      What? Like “I’lL mAkE mY oWn EnCrYpTiOn”?

      The administrator (creator) aledgedly created the platform 9 years ago when he was 23…

      • Brkdncr@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        3 months ago

        Actually I’m thinking of Phantom Secure. They built phones to go along with their app services.