https://www.nieuwsblad.be/binnenland/overheidsdienst-kan-en-mag-voortaan-je-smartphone-ontgrendelen-hoogst-problematisch/138953487.html (paywall)
#HomelandSecurityInvestigations (HSI), il braccio operativo dell'Immigration and Customs Enforcement (ICE) degli Stati Uniti, ha firmato un contratto del valore di 3 milioni di dollari con #MagnetForensics, un'azienda che produce un dispositivo per l'hacking e lo sblocco dei telefoni chiamato Graykey.
Il contratto, apparso martedì in un database di appalti del governo federale, si riferisce alle licenze software per la tecnologia di hacking telefonico di HSI "per recuperare prove digitali, elaborare più dispositivi e generare report forensi essenziali per la missione di protezione della sicurezza nazionale e pubblica".
Sebbene il contratto non menzioni il nome del prodotto, è probabile che si riferisca a #Graykey, un sistema forense per sbloccare gli smartphone ed estrarre dati da essi, originariamente sviluppato da Grayshift. Magnet Forensics si è fusa con Grayshift in seguito all'acquisizione da parte della società di private equity Thoma Bravo nel 2023.
techcrunch.com/2025/09/18/ice-…
Il post di @lorenzofb è su #TechCrunch
RE: infosec.exchange/users/lorenzo…
Update 3: You can find my PostMortem here: https://infosec.exchange/@masek/114721620930871030
Update 2: As far as I can tell, the servers that caused the leak belonged to the DOJ in Montana. We reached them in two ways:
Thanks to this community I was also able to get a contact within the FBI. Furthermore some media contacted me and a lot of Mastodon users provided me with additional contacts.
Event though I contacted the AG in Monatana and one PD, no one has reached out to me from the DOJ side.
Update 1: Leak is closed. Will write more tomorrow. Thank you to everyone who helped.
Phone forensics
Usually law enforcement is very secretive about them analyzing the phones of suspects.
But a forensic lab in #montana is extremely transparent about it. They put the dump of every phone on a public share. Everyone with Internet access can access those dumps.
While I am usually a proponent of government transparency, this takes it a bit too far even for my taste.
Every phone dump is one directory and some case names can be easily connected to crime & death headline news in the U.S.
So for one case I am pretty sure, that I can even say which Sheriff is responsible for that one of the investigations.
I sent that Sheriff an email, i sent him a text message and I even spoke on his voicebox. I even sent him the extraction report from Graykey.
It is really frustrating that I get no response at all. The leak is still open.
The security researcher that found the leak also tried some contacts but had as little success as I do.
I personally believe that this leaks even constitutes a federal crime. Some cases have names ending on CSAM. The security researcher stayed away from any of those and I did not access the files on that server at all.
So does anybody know someone within the #fbi that would give a shit about that. I am getting very tired.
## PostMortem: Assumed DOJ Montana Leak of Phone Dumps ### Type of leak Highly confidential information on a public SMB share without authentication ### Threats from the leak I see the following threats: - Integrity and Confidentiality of investigations into serious crimes compromised - Privacy of U.S. citizens compromised (very likely to contain most intimate data) - Providing 3rd parties hostile to the U.S. with blackmail material 1/4
#iPhone@josephcox where can I get this gile?
"With iOS 18.0, released to the public on September 16, Graykey has “partial” access to data from the iPhone 12 right up to the latest iPhone 16 series. The same is true for those iPhones running iOS 18.0.1, which was released on October 3, according to the document.
The document does not list what exact types of data are included in a “partial” retrieval and Magnet declined to comment on what data is included in one. In 2018, Forbes reported that a partial extraction can only draw out unencrypted files and some metadata, including file sizes and folder structures.
Still, the new document indicates Graykey is not able to obtain all of the data from modern iPhones."
https://www.404media.co/leaked-documents-show-what-phones-secretive-tech-graykey-can-unlock-2/
#CyberSecurity #Hacking #iPhone #iOS #Graykey #Android #GooglePixel
Si Cellebrite a beaucoup fait parler d’elle, c’est loin d’être la seule boîte spécialisée dans le crack d’iPhone. Magnet Forensics est une entreprise américaine faisant elle aussi son beurre sur l’ouverture d’appareils iOS et Android verrouillés. Sel...