2021-01-19 at 4:54 AM UTC
How hard would it be to plant software on phones, computers with the intent of if/when they get seized by the police for analysis that they infect the police computers?
2021-01-19 at 5:37 AM UTC
aldra
JIDF Controlled Opposition
it's possible, depends on knowing what software they use for forensics and how they operate
that said they tend to plan for it
2021-01-19 at 12:02 PM UTC
aldra
JIDF Controlled Opposition
that is to say they usually just pop out the harddrive and plug it into a USB-SATA case in read only mode so that the data on the harddrive can't be changed. it doesn't mean that a virus or malware or whatever on that drive couldn't potentially infect the host machine they're using to read it
2021-01-19 at 12:04 PM UTC
aldra
JIDF Controlled Opposition
I mean, assume there's some zero day in the photo viewer they're using, when they open one of your photos it triggers the exploit and runs the malware
not likely or feasible but not totally impossible either
2021-01-19 at 11:25 PM UTC
Hak5's Key Croc, would be a pretty decent way to go about such an operation. Write up your payloads and configure your C2, only problem is they're a bit bulky to pass for ordinary USB sticks. If you have the capacity you could always write your own HID attack vector to a custom built variant that actually looks like a USB stick. You could then sprinkle those around your local PD. I realize that doesn't answer your question but if you suspect your electronics will be seized soon you could always pre-empt them by starting an operation to pwn the police in advance.