Discussion
Loading...

#Tag

  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
informapirata ⁂ :privacypride:
informapirata ⁂ :privacypride: boosted
Cybersecurity & cyberwarfare
@cybersecurity@poliverso.org  ·  activity timestamp 3 weeks ago

[h1][b][url=https://techcrunch.com/2025/09/18/ice-unit-signs-new-3-million-contract-for-phone-hacking-tech/]L'ICE, l'antiimmigrazione USA, firma un nuovo contratto da 3 milioni di dollari per la tecnologia di hacking telefonico[/url][/b][/h1]

#[url=https://poliverso.org/search?tag=HomelandSecurityInvestigations]HomelandSecurityInvestigations[/url] (HSI), il braccio operativo dell'Immigration and Customs Enforcement (ICE) degli Stati Uniti, ha firmato un contratto del valore di 3 milioni di dollari con #[url=https://poliverso.org/search?tag=MagnetForensics]MagnetForensics[/url], un'azienda che produce un dispositivo per l'hacking e lo sblocco dei telefoni chiamato Graykey.

Il contratto, [url=https://www.fpds.gov/ezsearch/search.do?q=%22magnet+forensics%22+CONTRACTING_AGENCY_NAME%3A%22U.S.+IMMIGRATION+AND+CUSTOMS+ENFORCEMENT%22&s=FPDS.GOV&templateName=1.5.3&indexName=awardfull&sortBy=SIGNED_DATE&desc=Y]apparso martedì in un database di appalti del governo federale[/url], si riferisce alle licenze software per la tecnologia di hacking telefonico di HSI "per recuperare prove digitali, elaborare più dispositivi e generare report forensi essenziali per la missione di protezione della sicurezza nazionale e pubblica".

Sebbene il contratto non menzioni il nome del prodotto, è probabile che si riferisca a #[url=https://poliverso.org/search?tag=Graykey]Graykey[/url], un sistema forense per sbloccare gli smartphone ed estrarre dati da essi, originariamente sviluppato da Grayshift. [url=https://techcrunch.com/2023/01/20/thoma-bravo-agrees-to-acquire-digital-forensics-firm-magnet-forensics-for-over-1b/]Magnet Forensics si è fusa con Grayshift[/url] in seguito all'acquisizione da parte della società di private equity Thoma Bravo nel 2023.

https://techcrunch.com/2025/09/18/ice-unit-signs-new-3-million-contract-for-phone-hacking-tech/

@[url=https://feddit.it/c/informatica]informatica[/url]

Il post di @[url=https://infosec.exchange/users/lorenzofb]lorenzofb[/url] è su #TechCrunch

RE: https://infosec.exchange/users/lorenzofb/statuses/115226307077475237

  • Copy link
  • Flag this post
  • Block
Cybersecurity & cyberwarfare
@cybersecurity@poliverso.org  ·  activity timestamp 3 weeks ago

[h1][b][url=https://techcrunch.com/2025/09/18/ice-unit-signs-new-3-million-contract-for-phone-hacking-tech/]L'ICE, l'antiimmigrazione USA, firma un nuovo contratto da 3 milioni di dollari per la tecnologia di hacking telefonico[/url][/b][/h1]

#[url=https://poliverso.org/search?tag=HomelandSecurityInvestigations]HomelandSecurityInvestigations[/url] (HSI), il braccio operativo dell'Immigration and Customs Enforcement (ICE) degli Stati Uniti, ha firmato un contratto del valore di 3 milioni di dollari con #[url=https://poliverso.org/search?tag=MagnetForensics]MagnetForensics[/url], un'azienda che produce un dispositivo per l'hacking e lo sblocco dei telefoni chiamato Graykey.

Il contratto, [url=https://www.fpds.gov/ezsearch/search.do?q=%22magnet+forensics%22+CONTRACTING_AGENCY_NAME%3A%22U.S.+IMMIGRATION+AND+CUSTOMS+ENFORCEMENT%22&s=FPDS.GOV&templateName=1.5.3&indexName=awardfull&sortBy=SIGNED_DATE&desc=Y]apparso martedì in un database di appalti del governo federale[/url], si riferisce alle licenze software per la tecnologia di hacking telefonico di HSI "per recuperare prove digitali, elaborare più dispositivi e generare report forensi essenziali per la missione di protezione della sicurezza nazionale e pubblica".

Sebbene il contratto non menzioni il nome del prodotto, è probabile che si riferisca a #[url=https://poliverso.org/search?tag=Graykey]Graykey[/url], un sistema forense per sbloccare gli smartphone ed estrarre dati da essi, originariamente sviluppato da Grayshift. [url=https://techcrunch.com/2023/01/20/thoma-bravo-agrees-to-acquire-digital-forensics-firm-magnet-forensics-for-over-1b/]Magnet Forensics si è fusa con Grayshift[/url] in seguito all'acquisizione da parte della società di private equity Thoma Bravo nel 2023.

https://techcrunch.com/2025/09/18/ice-unit-signs-new-3-million-contract-for-phone-hacking-tech/

@[url=https://feddit.it/c/informatica]informatica[/url]

Il post di @[url=https://infosec.exchange/users/lorenzofb]lorenzofb[/url] è su #TechCrunch

RE: https://infosec.exchange/users/lorenzofb/statuses/115226307077475237

  • Copy link
  • Flag this post
  • Block
Martin Seeger
@masek@infosec.exchange  ·  activity timestamp 4 months ago
Update 3: You can find my PostMortem here: https://infosec.exchange/@masek/114721620930871030

Update 2: As far as I can tell, the servers that caused the leak belonged to the DOJ in Montana. We reached them in two ways:

  • Through this post we got contact to the vendor of the software. With the Serial# (in the extraction reports) they could identify whom to call.
  • A friend had a contact in one of the affected police department and they reached out to the DOJ.

Thanks to this community I was also able to get a contact within the FBI. Furthermore some media contacted me and a lot of Mastodon users provided me with additional contacts.

Event though I contacted the AG in Monatana and one PD, no one has reached out to me from the DOJ side.

Update 1: Leak is closed. Will write more tomorrow. Thank you to everyone who helped.

Phone forensics

Usually law enforcement is very secretive about them analyzing the phones of suspects.

But a forensic lab in #montana is extremely transparent about it. They put the dump of every phone on a public share. Everyone with Internet access can access those dumps.

While I am usually a proponent of government transparency, this takes it a bit too far even for my taste.

Every phone dump is one directory and some case names can be easily connected to crime & death headline news in the U.S.

So for one case I am pretty sure, that I can even say which Sheriff is responsible for that one of the investigations.

I sent that Sheriff an email, i sent him a text message and I even spoke on his voicebox. I even sent him the extraction report from Graykey.

It is really frustrating that I get no response at all. The leak is still open.

The security researcher that found the leak also tried some contacts but had as little success as I do.

I personally believe that this leaks even constitutes a federal crime. Some cases have names ending on CSAM. The security researcher stayed away from any of those and I did not access the files on that server at all.

So does anybody know someone within the #fbi that would give a shit about that. I am getting very tired.

#graykey #cellebrite #forensics

  • Copy link
  • Flag this post
  • Block
Log in

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.0-rc.3.13 no JS en
Automatic federation enabled
  • Explore
  • About
  • Members
  • Code of Conduct
Home
Login