Encrypted Messaging Service Cracked by Belgian Police, Followed by Dozens of Arrests (brusselstimes.com) 92
"The cracking of a previously-unbreakable encrypted messaging service popular with criminals involved in drug trafficking and organised crime delivered a major victory for the justice system on Tuesday," writes the Brussels Times, in a story shared by DI4BL0S:
The cracking of the expensive messaging app, called "Sky ECC," was what allowed over 1,500 police officers across Belgium to be simultaneously deployed in at least 200 raids, many of which were centred around Antwerp and involved special forces. Investigators succeeded in cracking Sky ECC at the end of last year, according to reporting by De Standaard, and as a result were able to sort through thousands of messages major criminals were sending each other over the course of a month. Information gained from those conversations is what led to Tuesday's historic operation, two years in the making.
Sky ECC became popular with drug criminals after its successor Encrochat was cracked in 2020 by French and Dutch investigators, who were able to intercept over 100 million messages sent via the app. That led to over a hundred suspects being arrested in the Netherlands, uncovering a network of laboratories where crystal meth and other drugs were being produced and allowing police to seize 8,000 kilos of cocaine and almost €20 million....
In a press conference by Belgium's federal public prosector's office on Tuesday afternoon, authorities stated that 17 tonnes of cocaine and €1.2 million were seized, and that 48 suspects were arrested.
Critics of Sky ECC "say more than 90% of its customers are criminals," according to the Brussels Times. Days later America's Justice Department indicted the CEO of Sky Global "for allegedly selling their devices to help international drug traffickers avoid law enforcement," reports Vice. They call it "only the second time the DOJ has filed charges against an encrypted phone company, and signals that the DOJ will continue to prosecute the heads and associates of companies that they say cater deliberately to facilitating criminal acts."
Earlier the Brussels Times had quoted the app's makers statement that they "strongly believe that privacy is a fundamental human right."
The newspaper also reported that Sky ECC calls itself "the world's most secure messaging app" — and "had previously said 'hacking is impossible'" — though in fact investigators have already decrypted almost half a billion messages.
Sky ECC became popular with drug criminals after its successor Encrochat was cracked in 2020 by French and Dutch investigators, who were able to intercept over 100 million messages sent via the app. That led to over a hundred suspects being arrested in the Netherlands, uncovering a network of laboratories where crystal meth and other drugs were being produced and allowing police to seize 8,000 kilos of cocaine and almost €20 million....
In a press conference by Belgium's federal public prosector's office on Tuesday afternoon, authorities stated that 17 tonnes of cocaine and €1.2 million were seized, and that 48 suspects were arrested.
Critics of Sky ECC "say more than 90% of its customers are criminals," according to the Brussels Times. Days later America's Justice Department indicted the CEO of Sky Global "for allegedly selling their devices to help international drug traffickers avoid law enforcement," reports Vice. They call it "only the second time the DOJ has filed charges against an encrypted phone company, and signals that the DOJ will continue to prosecute the heads and associates of companies that they say cater deliberately to facilitating criminal acts."
Earlier the Brussels Times had quoted the app's makers statement that they "strongly believe that privacy is a fundamental human right."
The newspaper also reported that Sky ECC calls itself "the world's most secure messaging app" — and "had previously said 'hacking is impossible'" — though in fact investigators have already decrypted almost half a billion messages.
Private Keys (Score:5, Informative)
Re: Private Keys (Score:2)
And even if they don't it might not be.
Was it cracked or is that just a cover story? (Score:1)
No basis I can find for that wannabe FP about private keys. (But my webpage search might be broken again? What's with Firefox these days? Should I get a "Born to be pwned" tattoo? Or at least a sticker for my smartphone case?)
My initial reaction to this story is to doubt the claim of cracking. What better way to divert the criminals' attention when the actual breach might be somewhere else? It's just difficult for me to believe that anyone, even a scammer, can sell a high-priced encryption scheme that can b
Re: (Score:2)
I think they just went to engineers that designed that system, showed them some evidence of what they would make them complicit in if they did not help and then gave them some time to install a nice little backdoor.
The problem is that any for-profit offering is vulnerable to this type of legal attack, because you can always identify the people working for it and go after them.
Re: (Score:2)
One of the "human links" in the chain, eh? Sounds quite likely.
But I'm thinking that approach might blow the "cover story". From the prosecutors' perspective, they always want the criminals to do stupid stuff the produces lots of nice evidence. Not just hope they do stupid things, but even actively encourage them when possible and withoug creating more victims.
Re: (Score:2)
Re: (Score:2)
Yes. That is why anything really secure only relies on both endpoints being secure. In that case, as soon as one endpoint is attacked successfully, it does not matter if the tech-side is compromised, the attacker has everything anyways.
Re: (Score:2)
It's not private if someone else holds your private key.
Indeed. But apparently criminals value ease-of-use over actual security as well, just as anybody else.
Re: (Score:2)
It's not private if someone else holds your private key.
Correct, but what isn't clear is if a private key was compromised or if the encryption itself was. You holding on to your only key means nothing if I'm able to pick your lock.
Re: (Score:2)
I'd use a Navajo Code Talker.
Re: (Score:3)
I tried arranging that, but Nicholas Cage isn't answering my calls...
Re: (Score:1)
Does no matter the type o encryption man. All that matters is the authoritays snagging an individual that can be extorted into giving them access, crack the people not the code man. I know you have to be patient but the time waiting allows the encryption to become more popular and a much bigger more effective net to be cast, to catch all those naughty people.
It is inevitable, those behind those scams are criminals who will end up involved in criminal acts, often involving minors and then they are done and t
Re:Whatsapp (Score:4, Interesting)
Re: (Score:2)
Re: (Score:2)
This is not from me but from a related article on a Belgian news site: Whatsapp encrypts the contents of messages, but stores (and uses for themselves) the metadata.
As in, where you were when you sent the message and at what time. Useful information for the police, so criminals don't want that.
Re: (Score:2)
And a blue submarine? (Score:1)
While this took place in Belgium, the Spanish police found a blue submarine in a warehouse in Malaga [bbc.com] which was to be used to transport drugs. The BBC article said the find involved five other nations and Europol. It's possible the Belgium police provided information which may have helped track this down as well.
Re: (Score:2)
I'm not sure I'd want to go underwater in that thing.
Re: (Score:2)
Re: (Score:1)
Smuggler subs don't need to go deep, anything waterproof will work.
Yeah.. I was thinking that..probably why it wuz blue, and not yellow :-)
All encrypted messaging == facilitating crime (Score:2)
Not hard to see where this is going. Anything the police have trouble with is "catering criminal acts."
Re: (Score:2)
Encryption will be banned.. (Score:5, Insightful)
Re: (Score:2)
The banning of encryption isn't enforceable, to do that you would have to monitor all communications. Also a growing majority of internet traffic is now encrypted (think https)
Re: Encryption will be banned.. (Score:1)
Re: (Score:2)
And all you'll have to do is crack open a laptop and send a key to your friend and start your encryption channel
Re: (Score:2)
It is not enforceable in the abstract sense - people can write their own encryption software at any time of course.
But it is very enforceable in the practical sense for about 99% of the population. First, the number of people who can write secure encryption apps is small. Even using standard algorithms and toolkits it is very difficult to implement securely end to end, especially if you have to assume your adversary has physical access to the device (i.e. a phone confiscated in an arrest). I don't find i
Re: Encryption will be banned.. (Score:2)
Re: (Score:2)
Re: Encryption will be banned.. (Score:2)
Re: (Score:2)
YOu dont understand there are no absolutes in our world. We can never reach absolute zero temp, you must obey some laws anarchy isnt not perfect freedom.
Im just saying out of all the aresholes in the world, the world would be a better place if every country was run by any of them as compared to Google or the USA.
Re: (Score:2)
So there were no criminals in East Germany? The government can spy on everybody but they can't arrest everybody. So they triage arrests, issue fines for petty reasons to keep the 'crime rate' up, frame people they don't like for the crimes they can't solve, or just ignore you until you've got something they need. This keeps real crime small, no gangs or drug lords, while petty crime (eg. shop-lifting, vandalism) sky-rockets.
Re: (Score:2)
What are you talking about?
Re: (Score:2)
Nothing petty about drug crime.
Re: (Score:2)
Was this a Police-created company and app? (Score:2)
Like fly paper.
Signal is not safe either. (Score:2)
Though I am glad they nailed these jokers, the fact they apparently got all of their Signal messages is ominous: https://www.buzzfeednews.com/a... [buzzfeednews.com]
Re: (Score:2)
Re:Signal is not safe either. (Score:5, Informative)
Like any other app, Signal is only as secure as the devices it's running on - and the way the police "hacked" these phones is by getting malware onto them.
But isn't that illegal? (Score:2)
Surely the police are guilty of "unauthorised access of a computer or computer network" or whatever the wording of the "hacking" law is? Sure, say "as if that would stop the police", but... surely what they did IS illegal and therefore there's a strong argument for any case to be dismissed because of this?
"privacy is a fundamental human right" (Score:2)
Hahahahahahahahaha! I love European humor.
Re: (Score:2)
Human rights are an straight jacket on government power with no justification. Deification of arbitrary rules ... a religion, but without even the excuse of divine inspiration.
Why use Sky ECC? (Score:5, Interesting)
I don't understand their rationale behind choosing this proprietary communication platform, when better choices are available. While Signal and Telegram require phone numbers, they could have used Matrix or Tox.
Re: Why use Sky ECC? (Score:2)
Re: (Score:2)
Re: (Score:2)
The "crack" was malware (Score:5, Informative)
However, this article [vice.com] states,
"The malware that French law enforcement deployed en masse onto Encrochat devices, a large encrypted phone network using Android phones, had the capability to harvest "all data stored within the device," and was expected to include chat messages, geolocation data, usernames, passwords, and more, according to a document obtained by Motherboard."
This certainly suggests that law enforcement were able to persuade a significant number of users of SkyECC to install some malware that broke the protections of the messaging service. There's more here. [vice.com]
That last link includes an explanation of how the Encrochat system was compromised by malware: "In May, some Encrochat users noticed a problem: the much lauded wipe feature on their phones wasn't working. An Encrochat associate told Motherboard that at the time they believed perhaps either the user had forgotten their reset PIN number, or that the wipe feature wasn't configured properly. Nothing to be alarmed about; users make mistakes. The next month, Encrochat managed to track down one of its particular X2 model devices which had the panic wipe issue, they explained.
This wiping problem wasn't user error though. The Encrochat associate told Motherboard they found malware on the device. The phone had been hacked."
None of which will come as any reassurance to any existing Encrochat customers, be they legitimate or criminal.
But, lest the cryptographers among us become concerned, it doesn't look as though this was an encryption defeat, more a handset-based work-around.
True, an less relevant than it first appears (Score:2)
That's interesting information. Thanks for that.
The danger when reading that is that conciously or subconsciously people think:
The encryption wasn't broken.
[
I'm using an encrypted device.
Therefore I'm safe.
]
In the end, it doesn't MATTER how they got the messages.
The criminals bought expensive "ultra secure" phones, used a "secure" messaging app, and the cops read the messages
Yes, the cops "cheated" - cheating is how this stuff works.
Hackers cheat. It's what we do.
On Thursday, my professor gave me
Re: (Score:2)
On Thursday, my professor gave me a binary I was supposed to hack. It was designed to be an exercise in "advanced ROP" - a very difficult challenge.
Wow cool, what degree are you getting now?
Re: (Score:3)
Finishing up my masters in cybersecurity.
That's my field.
There's one thing I didn't really think through all the way when Iapplied to one of the top 3 schools in my field. Graduates of this program are considered among the best. Sounds like a great program to do, right?
Well, it's prestigious not because it's *easy*. Turns out, when take 8000-level postgraduate courses at a top school, the classes are *hard*. Graduates are considered among the best *because* you have to be really good to make it through.
It
Re: (Score:2)
Well, it's prestigious not because it's *easy*. Turns out, when take 8000-level postgraduate courses at a top school, the classes are *hard*. Graduates are considered among the best *because* you have to be really good to make it through.
Yeah, it sounds like you're learning amazing stuff.
TI Grapics calculator seemed useless (Score:2)
Kids seem to need to buy them for school.
But actually, there is an opportunity in that they are not on the internet. Widely available and cheap. Put your crypto in there. Not sure if they could handle public key but symmetric would be no problem at all.
A bit of double typing, but hey, if you want it to be really secure that is probably the way to do it.
Re: (Score:2)
I'm not sure what you're saying. I think you might have replied to the wrong post.
Interesting idea. I had thought about microcontrol (Score:2)
That's kind of an interesting idea.
I had thought about using a microcontroller-based device for credential storage, but didn't want anything proprietary or too expensive.
For maximum functionality, it should have a keyboard and screen, but for safety no network / wireless hardware.
The right choice of programmable calculator might just be an interesting place to start.
Re: (Score:2)
It's interesting. And humbling - this stuff is cake for the profs.
My binary exploitation professor won $750,000 at one CTF, ad he hangs out with the best in the world. Apparently in South Korea some kids start learning hacking in elementary school, so the to top South Koreans some of this is high school shit.
On one of my cryptography papers I did cite one of the world's top experts, the Prof. I quoted one of her earlier papers. The answer was marked wrong. Challenging the TA who marked it wrong, I got
Re: (Score:2)
It's super cool. You're developing tons of skills I'd like to have (or improve).
Re: (Score:2)
Come and join us.
https://www.gatech.edu/academi... [gatech.edu]
The cost is under $10,000, which is likely to be made up by a single year of increased salary.
It does mean trading a lot of Slashdot time for study time.
But, you get to talk with fellow cybersecurity students instead of Slashdotters.
Re: (Score:2)
Finishing up my masters in cybersecurity.
That's my field.
B) Formerly prove that all such hashes are breakable
C) Show formerly how many CPU operations are required to break them.
Good luck. I'll look forward to your informative posts even more now.
But, unless you're engaged in time travel, you may want to formally prove and / or demonstrate your knowledge. ;-)
Re: (Score:2)
I'm glad I did it formerly, because I don't want to do I formally in the future! ;)
Break Merkle-Damgard hashes (Score:1)
If you mean recovering the original string from the hash then you must be a genius. If you mean, generate collisions then that's already been done. If you mean brute force the hash against a word list, then that isn't breaking MD hashes.
Re: (Score:2)
There were actually a couple of assignments related to hashes.
One was finding the hash without knowing the input.
That was a head scratcher at first.
That's defeating a scheme like like this:
Message = k
Transaction: Transfer to account 303938, amount: 300
Hash: hash_alg($secret key . $transaction)
)
Assignment:
Given a message (a transaction and it's hash),
make a valid message for a *different* transaction.
You must calculate the hash value without knowing the secret key.
Note your code must work for all md4, md5, a
Re: (Score:2)
Ps - yes these things have been done before.
Running 27 mph has been done before too. That doesn't mean it's easy.
> If you mean recovering the original string from the hash then you must be a genius
That's actually trivially easy in some important cases.
It's quite doable, though not trivial, in the very important case of passwords. Technically with passwords what you know for certain is that you found a preimage, and that preimage is almost certainly the original string (because n inputs are evenly mapped
Re: (Score:1)
Hashing loses information
Re: (Score:2)
Hashing loses information *when the input is longer than the hash*.
Passwords are not long. They are typically 64-96 bits.
The SHA-1 hash is 160 bits.
That means there are about 2^96 as many potential hashes than there are passwords.
Suppose you have 1 million baskets laid out on the floor.
You have a deck of 52 playing cards.
You randomly throw each towards the baskets.
The queen of hearts lands in basket number 634,884
You and I both know that the queen of hearts landed in basket number 634,884. If I take a car
Re: (Score:2)
Re: The "crack" was malware (Score:2)
Re:The "crack" was malware (Score:4, Informative)
Re: (Score:2)
Re: The "crack" was malware (Score:2)
You can build encryption that cannot be cracked. Itâ(TM)s not even hard. RSA was explained very nicely in The Art of Computer Programming around 1985. If you have uncrackable encryption attackers will figure out how to get the plaintext without decrypting it.
Re: (Score:2)
Re: (Score:2)
Probably a supply-chain attack on the phone update mechanism. Would not surprise me one bit.
Re: (Score:2)
Mod parent up! (Score:2)
Sky ECC claims hacked phones not theirs (Score:1)
Old Rule of Thumb (Score:2)
If you want real security, don't connect to the internet.
DOJ indicted the CEO of Sky Global (Score:2)
So guns manufacturers should also be indicted?
Re: (Score:2)
Sky ECC denies the hack (Score:3)
Note: I'm not sure what to make of this claim, other than that the proof is in whether the Dutch authorities were able to compromise the encryption of actual Sky ECC phones. We'll know that from court filings I suppose.
maybe both are true (Score:2)
The company claims that fake "Sky ECC" phones were
distributed containing already-broken security.
That would actually be a pretty clever way for the cops
to nap the crooks who wouldn't know any different.