FBI Encrypted Devices Were Sold To Crime Groups

Share post:

Authorities recently revealed that the FBI and Australian Federal Police secretly operated an “encrypted device company” called “Anom,” which sold 12,000 smartphones to crime syndicates worldwide.

These phones were originally secure devices that relayed all messages to a server owned by the FBI.

The FBI has weaponized what the Android modding community has been doing for years.

Some Android phones have unlockable bootloaders that can be used to erase the original operating system and replace it with a custom build of an operating system called a custom ROM.

FBI’s custom ROM displays an “ArcaneOS” boot screen, and it replaced the normal Google Android distribution with the FBI’s skin of Android 10.

The selling point for alleged criminal groups was that the security-oriented devices had a lot of fun security theater.

A “pin scrambling” feature would change the order of the lock screen numbers so that no one could guess the code based on screen smudges.

The compromised phones of the FBI show some red flags that a tech-savvy user should recognize.

When launching an Android phone, the first check that happens is Verified Boot, which ensures that the operating system is cryptographically signed by the device manufacturer, which guarantees that it has not been tampered with.

If a device fails verified boot, either because it has an unlocked bootloader or a newly locked bootloader with manipulated software, it will display a message during startup. In this case, the FBI devices will display a message saying, “Your device is loading a different operating system,” complete with a yellow exclamation mark and a link to a Google support page at g.co/ABH.

The FBI modified a lot of the core Android operating system by removing helpful Android settings that could reveal the device’s true purpose.

The system settings for apps, storage and accounts have all been removed and there is now no way to see a list of all installed system apps where users might discover something suspicious like “FBI_Spyware.APK.”

The FBI also deleted the “Location” settings to prevent users from turning off GPS tracking.

The device also has the Play Store or other Google apps, and except for a watch and the calculator app which leads to a compromised chat app, no other apps worked.

For more information, read the original story in Arstechnica.

SUBSCRIBE NOW

Related articles

Cyber Security Today, May 15, 2024 – Ebury botnet still exploits Linux servers, Microsoft, SAP and Apple issue security updates

The Ebury botnet continues to exploit Linux servers, Microsoft, SAP and Apple issue security updates, and more. Welcome to...

Employee errors still predominant cause of data breaches: Verizon Report

In the latest 2024 Verizon Data Breach Report (DBIR), it has been revealed that employee errors remain the...

Black Basta has compromised over 500 organizations globally:CISA

The Cybersecurity and Infrastructure Security Agency (CISA) along with the FBI reported that the Black Basta ransomware group...

Cyber Security Today, May 10, 2024 – Patches for F5’s Next Central Manager released, Dell discovers data theft covering millions, and more

Patches for F5's Next Central Manager are released, Dell discovers data theft covering millions of buyers, and more Welcome...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways