User Controls

Lebanon's Spicy Batteries

  1. #1
    ner vegas African Astronaut
    I’ll try and keep this concise, so cliff notes for what happened:

    Incident
    On the 17/09, pagers started exploding across southern Lebanon. Hezbullah typically used these pagers to transmit one-way status updates, warnings of inbound strikes etc. to their soldiers and people in the community, and it was the specific brand and model Hezbullah preferred that were exploding. Roughly 3,000 people were hospitalised and 10 killed outright which flooded the Lebanese hospital system, prompting medical resources to be transferred from friendly countries such as Iran and Iraq.

    Two days later, other devices began exploding as well, primarily portable ICOM-branded radios but there were also reports of various other items such as clock radios, portable solar chargers, remote access keypads and other personal electronics. This wave of explosions was smaller but more lethal – roughly 400 reported injured and another 10 or so killed.

    Cause
    The initial news reports, mostly citing anonymous US/israeli sources claimed that it was a cyberattack and that the israeli intelligence services had found a way to remotely detonate the lithium cells inside the pagers. This was obviously not true given the videos of explosions – they were high explosives, there were no major fires and no characteristic vapor/smoke, as well as the explosions themselves being too violent and consistent.

    It was later leaked by the Lebanese investigation team (and ‘confirmed’ by anonymous israeli intelligence sources) that the pagers had been tampered with to contain around 20g of PETN explosive compound, and that the batteries had been shorted and overheated in order to detonate the PETN charge.

    Attack Vector
    Initially I assumed that the pagers themselves had their firmwares hacked to detonate upon receiving a certain code, but the later explosions in other devices makes this seem less likely.

    The most likely attack vector is some kind of modular bomb built into the lithium cell – the attacker could remove the battery from the casing, put a smaller battery and triggering system (likely a small radio antenna that shorts the battery when receiving a specific frequency, as space would be too limited for decoding chips or anything like that) in the casing and fill the remainder of the void with PETN. With this kind of device an attacker could replace the lithium cell in any portable device with a hidden bomb without having to worry about software/firmware/circuitry in the device itself.

    Supply Chain Attack
    Before the second wave of attacks, analysis was focused on the pagers themselves – they were the AP-924 model manufactured by the APOLLO GOLD company in Taiwan, a model that was popular in the 2000s and still in use by hospitals and other critical centres that wanted a way to keep contact with staff if cellular networks failed.

    APOLLO is now under investigation by the Taiwanese authorities and has released several statements relating to the AP-924 – specifically that they no longer manufacture the device themselves, and that they’ve licensed the design to a Hungarian consultancy firm, and the design has been changed since it was transferred.

    The consultancy firm, BAC Consulting, appears to be some kind of front organisation as it only has one registered employee (a woman who appears to have had her identity stolen, as she published several academic papers on hydroelectric cells in the mid-2000s before re-emerging as a generic NGO volunteer in the 20202s), a website (now deleted) that says nothing about what the company does or any kind of manufacturing capability and annual cash inflows of $500,000+ since 2022. It stands to reason that this company or its subsidiaries were set up explicitly for this kind of sabotage.

    As an aside, there are also reports that the manufacturer would not ship the batch of pagers directly to Lebanon, instead sending to Jordan where it was held by customs before being transferred on – leading to speculation that they could’ve been tampered with there.

    HANDALA Hacks
    A pro-Palestinian hacker group calling itself HANDALA claims to have hacked several israeli companies involved with this attack and will release evidence ‘in a matter of hours’.

    They claim that the battery bombs were developed by Israeli Industrial Batteries in conjunction with Unit 8200, israel’s famed SIGINT/Electronic Warfare unit. According to them the explosive batteries were manufactured in israel, then shipped to Europe (specifically to the manufacturing plant affiliated with the aforementioned BAC) and implanted in the pagers and potentially other devices meant to be delivered to Lebanon (indicating that the sabotage was performed at the site of manufacture, not in customs in a transit country).

    This, however calls into question how the Mossad was able to transfer large amounts of explosive into the EU and out again after assembly.

    The answer to that question is that Vidisco is another israeli state-adjacent company that works with Unit 8200. Vidisco manufactures around 80% of the X-ray and contraband detection hardware used in western airports and seaports, and apparently maintain backdoors that allow israeli state operations to simply silence detection on shipments they want to keep secret.

    HANDALA claim to have around 20TB of data stolen from the two companies to prove their claims; we’ll see if they’re able to deliver.
    The following users say it would be alright if the author of this post didn't die in a fire!
  2. #2
    ner vegas African Astronaut
    https://t.me/handala_hack2/100

    10 GB of confidential data of cooperation between Mossad and Vidisco


    According to the data leaked by Handala, now the security and military services of 91 countries of the world are using Vidisco products in their security gates. Mossad, in cooperation with vidisco, has the possibility to prevent the identification of contaminated shipments in these countries!

    In the last ten years, according to the log extracted from the vidisco server, Mossad has used this company's backdoor in 2780 cases in 37 countries. Countries such as Lebanon, Syria, India, Turkey, Taiwan, Thailand, United Arab Emirates, America, Germany, Iraq, etc. are at the top of the polluted countries.


    We are now releasing 10 GB of sensitive design and development documents! Wait for the backdoor source to be leaked!

    will check out the archive tomorrow
  3. #3
    ner vegas African Astronaut
    Originally posted by ner vegas will check out the archive tomorrow

    appears to be legit, there are a lot of CAD files for their various products. I haven't seen any useful correspondence in there though.

    https://t.me/handala_hack2/106

    As promised, we will release all vidisco software sources!

    Do not go to the company these days! Our HodHod drone may land on your head!

    Does the world know what illegal shipments have entered their country with the cooperation of Mossad and Vidisco? Stay with us!

    link instantly died.
  4. #4
    Bradley Florida Man
    KIKE LOVER!!!
  5. #5
    ner vegas African Astronaut
    Originally posted by ner vegas appears to be legit, there are a lot of CAD files for their various products. I haven't seen any useful correspondence in there though.

    https://t.me/handala_hack2/106



    link instantly died.

    more leaked data released, this time internal administration.

    again it appears legit, but it does not seem to contain anything referring to or related to supposed backdoors. then again it's another 10GB package and half of it's in Hebrew.
  6. #6
    Instigator Naturally Camouflaged [the staring tame crusher]
    I thought this was going to be a recipe thread. I could go for Some lex-mex.
  7. #7
    Originally posted by ner vegas This, however calls into question how the Mossad was able to transfer large amounts of explosive into the EU and out again after assembly.

    lol. large amount.

    20g (allegedly) per device. times 5k.

    you can pack that in a large suitcase/luggage and still have plenty room left for a large, vibrating, reciprocating, black, power dildo.
  8. #8
    Speedy Parker Black Hole
    Originally posted by Charles Ex Machina lol. large amount.

    20g (allegedly) per device. times 5k.

    you can pack that in a large suitcase/luggage and still have plenty room left for a large, vibrating, reciprocating, black, power dildo.

    Believe him, he smuggles dildos.
Jump to Top