Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Hacker used Phantom memory...
#1
My computer was hacked.
The hacker installed files in my Phantom which open up files in a specific folder om my Mac.
Resetting the Phantom to factory default solved the problem.
I don't know if he used the Bluetooth or the WiFi to do this.
Phantom friends be aware this loop-hole.
Reply
#2
steenh: Actually there is no known way of hacking Phantom. The device itself is secured with ssh key, which is probably heavy guarded and not obtainable from Devialet. What exactly has happened and why do you think it's related to Phantom?
Reply
#3
(03-Oct-2016, 10:52)dmitrek Wrote: steenh: Actually there is no known way of hacking Phantom. The device itself is secured with ssh key, which is probably heavy guarded and not obtainable from Devialet. What exactly has happened and why do you think it's related to Phantom?

Tha Phantom was used to activate some programs that could load a spy program and later it was used to create a specific folder. The Spark icon was inside the folder with the code. I had to open my firewall settting to use the Phantom. Normally you just click the icon and Spark starts.
Setting Phantom to factory default ereased the files and I could setup again as normal.
I guess the Bluetooth hacking was used for this purpose as I found information about Bluetooth devices which couldn't been blocked on my Mac. Bluetooth hacking can be used by the neighbour because the distance is limited.
So watch your neighbours.
Reply
#4
Have you reported this issue to Devialet?
Living room: Kii Three/BXT with Control.
Den: Tannoy Precision 8 iDP with TS112 iDP subwoofer.
In the cupboard, waiting for a sibling: 1st gen. Phantom Silver running DOS1
My Phantom Voyage
Reply
#5
If you have deleted the evidence by resetting everything it will be hard for Devialet to see what happened.
Can you tell us which folder it was ? and why opening it was dangerous...
To get spyware you need a code to be executed or triggered
Are you sure it wasn't maintenance files instead of spyware crap ?
The way you explain it the hack is insidious... how did you find it ?
from my point of view if you physically access the phantom or Dialog does not mean you can access a folder on the PC.
Reply
#6
(03-Oct-2016, 12:00)ragwo Wrote: Have you reported this issue to Devialet?

No - I haven't reported.
I find it's too complicated. Thought about returning the speaker but for what use.
Reply
#7
(03-Oct-2016, 16:36)steenh Wrote:
(03-Oct-2016, 12:00)ragwo Wrote: Have you reported this issue to Devialet?

No - I haven't reported.
I find it's too complicated. Thought about returning the speaker but for what use.

Reporting the issue is really easy, use the report button in Spark.
Living room: Kii Three/BXT with Control.
Den: Tannoy Precision 8 iDP with TS112 iDP subwoofer.
In the cupboard, waiting for a sibling: 1st gen. Phantom Silver running DOS1
My Phantom Voyage
Reply
#8
(03-Oct-2016, 16:31)daibaron Wrote: If you have deleted the evidence by resetting everything it will be hard for Devialet to see what happened.
Can you tell us which folder it was ? and why opening it was dangerous...
To get spyware you need a code to be executed or triggered
Are you sure it wasn't maintenance files instead of spyware crap ?
The way you explain it the hack is insidious... how did you find it ?

The code was triggered by Spark.
I found a hidden folder on my Mac which connected to the spark AP.
After resetting the Phantom the AP icon could be moved to the application folder and
it work again until a new version from the hacker showed up.
My neighbour is an IT guy and he was assited by IT staff from his company.
This is not a normal hijack of a Mac. No one in Russia has an interest to do this and it is not possible unless
you live nearby because the limit distance of Bluetooth and WiFi.
I have checked my log files on my computer and can see what was going on.
He had used airdrop to downlaod files despite it was diabled from my Mac.
If he is in he can setup a hidden partion and activate all programs before start-up. That's what he did.
Finaly he used Uefi hacking which was discored 1 year ago.
All bluetooth devices can be hacked and controled by remote if you know how to do it.
Disable Bluetooth from the Phantom is the best solution.
Reply
#9
It looks like you're in the middle of a conspiracy...
Dont buy a Tesla.
Reply
#10
Did he hack your speakers as a proof of concept with your knowledge?
Living room: Kii Three/BXT with Control.
Den: Tannoy Precision 8 iDP with TS112 iDP subwoofer.
In the cupboard, waiting for a sibling: 1st gen. Phantom Silver running DOS1
My Phantom Voyage
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)