Devialet Chat
Hacker used Phantom memory... - Printable Version

+- Devialet Chat (https://devialetchat.com)
+-- Forum: Devialet Chat (https://devialetchat.com/Forum-Devialet-Chat)
+--- Forum: Phantom I (103 DB, 108 DB, Premier Classic, Silver & Gold) (https://devialetchat.com/Forum-Phantom-I-103-DB-108-DB-Premier-Classic-Silver-Gold)
+--- Thread: Hacker used Phantom memory... (/Thread-Hacker-used-Phantom-memory)

Pages: 1 2


Hacker used Phantom memory... - steenh - 03-Oct-2016

My computer was hacked.
The hacker installed files in my Phantom which open up files in a specific folder om my Mac.
Resetting the Phantom to factory default solved the problem.
I don't know if he used the Bluetooth or the WiFi to do this.
Phantom friends be aware this loop-hole.


RE: Hacker used Phantom memory... - dmitrek - 03-Oct-2016

steenh: Actually there is no known way of hacking Phantom. The device itself is secured with ssh key, which is probably heavy guarded and not obtainable from Devialet. What exactly has happened and why do you think it's related to Phantom?


RE: Hacker used Phantom memory... - steenh - 03-Oct-2016

(03-Oct-2016, 10:52)dmitrek Wrote: steenh: Actually there is no known way of hacking Phantom. The device itself is secured with ssh key, which is probably heavy guarded and not obtainable from Devialet. What exactly has happened and why do you think it's related to Phantom?

Tha Phantom was used to activate some programs that could load a spy program and later it was used to create a specific folder. The Spark icon was inside the folder with the code. I had to open my firewall settting to use the Phantom. Normally you just click the icon and Spark starts.
Setting Phantom to factory default ereased the files and I could setup again as normal.
I guess the Bluetooth hacking was used for this purpose as I found information about Bluetooth devices which couldn't been blocked on my Mac. Bluetooth hacking can be used by the neighbour because the distance is limited.
So watch your neighbours.


RE: Hacker used Phantom memory... - ragwo - 03-Oct-2016

Have you reported this issue to Devialet?


RE: Hacker used Phantom memory... - daibaron - 03-Oct-2016

If you have deleted the evidence by resetting everything it will be hard for Devialet to see what happened.
Can you tell us which folder it was ? and why opening it was dangerous...
To get spyware you need a code to be executed or triggered
Are you sure it wasn't maintenance files instead of spyware crap ?
The way you explain it the hack is insidious... how did you find it ?
from my point of view if you physically access the phantom or Dialog does not mean you can access a folder on the PC.


RE: Hacker used Phantom memory... - steenh - 03-Oct-2016

(03-Oct-2016, 12:00)ragwo Wrote: Have you reported this issue to Devialet?

No - I haven't reported.
I find it's too complicated. Thought about returning the speaker but for what use.


RE: Hacker used Phantom memory... - ragwo - 03-Oct-2016

(03-Oct-2016, 16:36)steenh Wrote:
(03-Oct-2016, 12:00)ragwo Wrote: Have you reported this issue to Devialet?

No - I haven't reported.
I find it's too complicated. Thought about returning the speaker but for what use.

Reporting the issue is really easy, use the report button in Spark.


RE: Hacker used Phantom memory... - steenh - 03-Oct-2016

(03-Oct-2016, 16:31)daibaron Wrote: If you have deleted the evidence by resetting everything it will be hard for Devialet to see what happened.
Can you tell us which folder it was ? and why opening it was dangerous...
To get spyware you need a code to be executed or triggered
Are you sure it wasn't maintenance files instead of spyware crap ?
The way you explain it the hack is insidious... how did you find it ?

The code was triggered by Spark.
I found a hidden folder on my Mac which connected to the spark AP.
After resetting the Phantom the AP icon could be moved to the application folder and
it work again until a new version from the hacker showed up.
My neighbour is an IT guy and he was assited by IT staff from his company.
This is not a normal hijack of a Mac. No one in Russia has an interest to do this and it is not possible unless
you live nearby because the limit distance of Bluetooth and WiFi.
I have checked my log files on my computer and can see what was going on.
He had used airdrop to downlaod files despite it was diabled from my Mac.
If he is in he can setup a hidden partion and activate all programs before start-up. That's what he did.
Finaly he used Uefi hacking which was discored 1 year ago.
All bluetooth devices can be hacked and controled by remote if you know how to do it.
Disable Bluetooth from the Phantom is the best solution.


RE: Hacker used Phantom memory... - daibaron - 03-Oct-2016

It looks like you're in the middle of a conspiracy...
Dont buy a Tesla.


RE: Hacker used Phantom memory... - ragwo - 03-Oct-2016

Did he hack your speakers as a proof of concept with your knowledge?