Cybersécurité

The FBI’s phone for criminals included a custom version of Android

The phones the FBI sold to crooks for a sting operation weren’t just running a custom app — it appears the operating system was also tweaked for those goals. Motherboard has obtained one of the « Anom » phones (really, a modified Pixel 4a), and its mysterious « ArcaneOS » has a number of customizations that you wouldn’t necessarily expect, even for a privacy-oriented phone.

For one, there are no app stores. You also can’t toggle location tracking. And don’t think you can simply flash the device with third-party firmware to make it behave more like normal phones — the bootloader is locked even though the startup screen tells you the device has been modified.

Some user said Anom was based on the existing GrapheneOS, but Anom may have lied to buyers about the software to instill a false sense of trust.

The interface does include some security features that would appeal to the criminal target audience, including a hidden chat app (accessed through the « calculator » when it worked) and PIN scrambling. A wipe code feature that lets you erase a phone from the lock screen is also present, although the Justice Department clearly didn’t like that feature when it charged some Anom developers with alleged obstruction of law enforcement.

At least one second-hand Anom phone owner say they got a Pixel 3a, suggesting the FBI transitioned to different devices as the sting unfolded.

You wouldn’t want to buy one of these devices, then, even for curiosity’s sake. However, it’s now clear just how far the FBI went to bust criminals. The agency wanted to give unsuspecting drug dealers the impression they were using a true encrypted phone, right down to the OS, even as the device quietly exposed messages to law enforcement agents.

Mots-clés : cybersécurité, sécurité informatique, protection des données, menaces cybernétiques, veille cyber, analyse de vulnérabilités, sécurité des réseaux, cyberattaques, conformité RGPD, NIS2, DORA, PCIDSS, DEVSECOPS, eSANTE, intelligence artificielle, IA en cybersécurité, apprentissage automatique, deep learning, algorithmes de sécurité, détection des anomalies, systèmes intelligents, automatisation de la sécurité, IA pour la prévention des cyberattaques.

Veille-cyber

Recent Posts

Bots et IA biaisées : menaces pour la cybersécurité

Bots et IA biaisées : une menace silencieuse pour la cybersécurité des entreprises Introduction Les…

5 jours ago

Cloudflare en Panne

Cloudflare en Panne : Causes Officielles, Impacts et Risques pour les Entreprises  Le 5 décembre…

5 jours ago

Alerte sur le Malware Brickstorm : Une Menace pour les Infrastructures Critiques

Introduction La cybersécurité est aujourd’hui une priorité mondiale. Récemment, la CISA (Cybersecurity and Infrastructure Security…

5 jours ago

Cloud Computing : État de la menace et stratégies de protection

  La transformation numérique face aux nouvelles menaces Le cloud computing s’impose aujourd’hui comme un…

6 jours ago

Attaque DDoS record : Cloudflare face au botnet Aisuru – Une analyse de l’évolution des cybermenaces

Les attaques par déni de service distribué (DDoS) continuent d'évoluer en sophistication et en ampleur,…

6 jours ago

Poèmes Pirates : La Nouvelle Arme Contre Votre IA

Face à l'adoption croissante des technologies d'IA dans les PME, une nouvelle menace cybersécuritaire émerge…

6 jours ago

This website uses cookies.