Menu
About me Kontakt

Seytonic discusses recent hacking news starting with the controversial incident involving an alleged assassination attempt on Donald Trump. The FBI announced that they successfully hacked Thomas Matthew Crooks' phone, who was arrested for the failed assassination. While the details remain unclear, it seems the method used by the FBI depended on the model of the phone Crooks had. Journalists speculate that it might be a Samsung device. If the phone was locked using fingerprint recognition, there is a possibility that the FBI could have used Crooks' finger to unlock it, although this technique only works shortly after death. Given the damage to the suspect's face, facial recognition was likely not an option.

During the actual hacking attempt, initial FBI agents in Pennsylvania failed to access the phone, so it was sent to the FBI lab in Quantico, where technology from Celebrite, an Israeli forensics company, was utilized. Celebrite has hardware and software that can unlock many modern phones by exploiting secret vulnerabilities in operating systems and software. As a result of hacking Crooks' phone, the FBI managed to extract some data, but the details have yet to be disclosed.

Another story mentioned by Seytonic is the massive AT&T data breach affecting over 100 million users. The hacker, who is alleged to be part of the cybercriminal group Shiny Hunters, seized a database containing call and SMS records, and in the age of cybercrime, such a breach can lead to serious privacy violations. It turns out the database was protected only by a simple username and password, suggesting that AT&T's security was at a low level.

The controversy also extends to Apple's decision to remove numerous VPN apps from the Russian App Store at the government's request. Hackers and VPN developers are shaken by this decision since VPNs are crucial in countries with strong censorship. While Apple claims it must adhere to local regulations, some experts argue that the company's irresponsible behavior may contribute to supporting an authoritarian regime.

In conclusion, Seytonic highlights current events related to digital security, emphasizing the need for better personal data protection. At the time of writing, the video has garnered over 433,735 views and 13,395 likes. The modern world of cybercrime presents serious challenges, and understanding privacy protection and using suitable technologies is key to safety.

Toggle timeline summary

  • 00:00 The FBI successfully hacked a phone belonging to an assassin.
  • 00:05 AT&T experiences a historic data breach, affecting over 100 million customers.
  • 00:11 The FBI's method of hacking depends on the type of phone used by the assassin.
  • 00:20 Images suggest the phone is an Android device, potentially a Samsung A25.
  • 00:45 Exploring the possibility of unlocking the phone using fingerprint recognition.
  • 01:06 The FBI resorted to technical methods after initial attempts to unlock failed.
  • 01:30 The phone was unlocked using technology from Celebrite, an Israeli forensics company.
  • 01:59 Data extraction from Android devices varies based on whether the device is hot or cold.
  • 02:19 Celebrite's tools can extract extensive data from most new Android phones.
  • 02:56 Hacking the phone did not reveal much useful information.
  • 04:46 AT&T's breach involved stolen call and SMS records, affecting a vast number of users.
  • 05:51 Potential privacy issues arise when combining this data with other breaches.
  • 06:25 The breach occurred due to poor security, relying only on a simple username and password.
  • 07:04 The hacker, associated with the group 'Shiny Hunters,' demanded a ransom.
  • 08:00 Apple removed VPN apps from the Russian App Store at the government's request.
  • 08:34 Russia's ongoing struggle to implement effective VPN regulations.
  • 09:20 VPN developers criticize Apple's decision, linking it to supporting authoritarianism.
  • 10:06 Discussion on whether Apple could oppose such censorship efforts.

Transcription

The FBI claims they've hacked the failed Trump assassin's phone, but how? Also in your hacking news roundup, AT&T suffers a historic breach, and Apple bans VPN apps in Russia. But first, the Feds have put out a statement, FBI technical specialists successfully gained access to Thomas Matthew Crooks' phone, but how? The hacking methods at the FBI's disposal totally depend on which model of phone the assassin had, and thanks to pictures leaked to the press, we have some clues. The photo is really low-res, but if we do some enhancing, it's clearly some kind of android. Looks like we have three cameras on the back, a flash, and the brand name at the bottom. My money's on some kind of Samsung, and I could be totally wrong, but perhaps the A25? Let's assume the phone was locked with fingerprint recognition. Could the Feds, after they finally got up onto that roof, just have touched his finger to the reader in order to unlock it? There are reported cases of law enforcement exploiting a corpse's finger to unlock a phone, but this is only possible soon after a person dies, because fingerprint scanners rely on the electric charge running through your body, and once that's gone, then you're just out of luck. As for facial recognition, the guy's face looked a little rearranged from the photos floating around on X, so I'm not sure that was much of an option. In fact, we know the FBI's methods were a little more technical, because according to The Verge, field agents in Pennsylvania had tried and failed to break into his phone, so the device was sent to the FBI lab in Quantico, Virginia. There, it's been leaked to the media that the phone was unlocked with tech from Celebrite. Celebrite is an Israeli forensics company which makes these things, a hardware and software package which, simply put, can break into and unlock many modern phones. This all relies on vulnerabilities in iPhones and Android devices, which Celebrite keeps secret. Even the capabilities of these tools is totally unknown, or at least it was until a couple of days ago when Celebrite's list of supported devices was leaked. So how this works is that the data that can be extracted from an Android phone depends on whether it's hot or cold. A cold device is a device that's just been rebooted, user data is totally inaccessible until you enter your passcode, at which point a decryption key is loaded into memory and the phone becomes hot. The phone is still considered hot even if it's locked again, because that key is still stored in memory. In this state, it's easy to extract data. This column shows that for the latest Samsung phones, the FEDs can exfiltrate everything. This applies to pretty much all the newest Android phones, though there are some devices which for whatever reason this isn't possible. However it's a slightly different story if the phone is in a cold state, as in it's only just been rebooted. In this state the phone has to be brute forced, but this is possible for pretty much most of the newest Android phones, including the phone of the assassin. We don't know how the brute forcing works on a technical level, Celebrite is known for their secrecy, and even tells the FEDs in training material to keep their methods, and I quote, hush hush. So what did hacking the assassin's phone reveal? Well according to media reports, which don't cite their sources, but I mean it's all we have to go on, not much apparently. But what I can reveal, is today's sponsor, Protonmail. What I love about Proton is that it's not just a privacy focused mail service, it's a privacy focused ecosystem, which makes de-googlifying your life easy. On the privacy end, Proton is protected by strict Swiss privacy laws, which means there's certainly no warrantless mass surveillance. What really stands out though is Protonmail's privacy section on the app store, they don't collect any of your personal data. The Gmail app though is a different story, Google collects over 50 data points on you, we're talking location, contacts, photos, and a lot more. Google simply lives and breathes on monetising your personal data, Proton doesn't, so they simply have no incentive to track the hell out of you. However what stopped me from switching to Proton for a good while, was that I thought I'd be compromising on functionality in some way, surely privacy comes at some kind of a cost. But no, Proton's cloud storage and calendar services fully integrate into mail, and switching to Protonmail is surprisingly easy. Their easy switch tool imports your calendars and contacts from whatever service you already use, but importantly it also imports your actual emails, so you don't have to give up on that all important email history. And best of all, Protonmail has a free tier so you can easily try it out, but their Proton Unlimited plan which comes in at just $10 a month, supports multiple email addresses, custom domains, and gives you access to their whole suite of services including a VPN, 500 gigabytes of cloud storage, and their password manager. The value here is simply unreal, I recommend this plan to everyone, family, friends, just everyone. Big thanks to Proton for sponsoring this video and make sure you go check them out using the link in the video description. AT&T has just suffered a truly historic breach. A hacker has stolen the database of the call and SMS records of nearly all of AT&T's customers. This even includes smaller MVNO carriers which use AT&T's network. In total this affects more than 100 million people. The records in the database span from May 2022 to October 2022, so if you were an AT&T customer during that time, or if you so much as sent a text message to someone who was, then chances are you're in here. In the company's own words, these records identify other phone numbers that an AT&T wireless number interacted with during this time, and for a subset of the records, one or more cell site ID numbers associated with the interactions are also included. These cell site IDs correspond to specific base stations, which could actually be used to unmask your real location. To be clear, the database contains AT&T customer phone numbers, and a list of other phone numbers they either called or texted, and just how many times. The actual content of phone calls and text messages aren't included, there's also no timestamps attached or personal information like your name or email address, but that doesn't mean there aren't major privacy implications here. The real danger comes when this dataset is combined with other breaches. I refer you to the Facebook data dump of 2021 which leaked the phone numbers of half a billion people along with a bunch of their personal data. Using breaches like this, cyber bad guys can uncover exactly who each person in the AT&T database is, and figure out exactly who they're talking to, and then exploit their information in all kinds of nefarious ways, like in personalised phishing scams. But how could a breach of this scale even happen? Surely a database of such proportions would have the highest level of security and authentication, right? Wrong. The database was apparently protected by a single username and password, no multi-factor authentication in sight. In fact this breach is part of the recent string of breaches affecting snowflake customers. Snowflake is a cloud storage platform hosting the data of many large companies, but when cyber criminals realised that many of these high profile accounts were protected by nothing more than a simple username and password combo that in some cases hadn't been changed for years, they went to town, using infostealer malware to scoop up credentials before just logging in and exfiltrating data. The playbook really was that simple. In the case of AT&T, the hacker is allegedly a member of the infamous group shiny hunters. They demanded a one million dollar ransom from AT&T, but reportedly settled for just $370,000. Why it is reporting that in return the hacker provided AT&T a video proving that they deleted the data, how a video of someone just right clicking and hitting delete proves anything is beyond me. But anyway, this breach originally happened in April this year, but the department of justice gave AT&T a couple extensions in terms of their reporting requirements which is why we're only just hearing about it now. AT&T mentioned in their SEC filing that someone has already been arrested for the hack. There's not much concrete information around this, but one John Binns was recently arrested in Turkey in connection with a T-Mobile breach from 2021. This same guy is apparently behind this latest AT&T breach. But FYI this is all according to anonymous sources, so take it with a pinch of salt. Apple has removed dozens of VPN apps from the Russian app store at the request of the Russian government. This affects 25 apps including popular VPNs like NordVPN, Proton and PIA. Almost overnight those users were met with errors that their favourite VPN app is no longer available in their country or region, which is especially annoying since Russia is one of those countries where having a VPN is actually kind of useful. App developers received emails from Apple explaining that their app was being deleted on the orders of the Roskomnadzor, the Russian government agency in charge of regulating telecommunications. However, the fact that Putin doesn't like VPNs isn't really news. In 2017 Russia passed a bill which effectively banned proxies, Tor and VPNs, however they haven't done a very good job of actually implementing that law. Over the past few years Russia has been relying on technological methods like deep packet inspection which detects and blocks VPN traffic in real time. But that hasn't worked out very well because unlike a country like China which implements restrictions centrally on a country wide level, Russia just doesn't have that level of infrastructure so they rely on each individual ISP to do the dirty work for them, which doesn't work quite as well because different ISPs implement blocks differently leading to really inconsistent enforcement, which might be one reason why Russia has said screw it and just turned to Apple to ban VPN apps en masse. VPN developers as you can imagine are not very happy, with some blaming Apple for this. RedShield VPN says Apple's actions, motivated by a desire to retain revenue from the Russian market, actively support an authoritarian regime. The fact that a corporation with a capitalisation larger than Russia's GDP helps support authoritarianism says a lot about the moral principles of that corporation. But does Apple realistically have a choice here? I mean companies simply have to obey the laws of the countries they operate in, whether that's in the US, Europe or Russia. Well maybe they do have a choice, Russia recently ordered Mozilla to ban certain Firefox addons they didn't like, and after initially complying with the ban, Mozilla went back on that and lifted the ban just a few days later, and for now at least, the Roskomnadzor hasn't done anything about it. Also it should be mentioned that Apple is about to allow sideloading of apps in the EU, if Apple really cares about censorship, maybe they could voluntarily extend that coverage to Russia. As always thanks for watching and I'll see you in the next video have a good one.