Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Hacker used Phantom memory...
#3
(03-Oct-2016, 10:52)dmitrek Wrote: steenh: Actually there is no known way of hacking Phantom. The device itself is secured with ssh key, which is probably heavy guarded and not obtainable from Devialet. What exactly has happened and why do you think it's related to Phantom?

Tha Phantom was used to activate some programs that could load a spy program and later it was used to create a specific folder. The Spark icon was inside the folder with the code. I had to open my firewall settting to use the Phantom. Normally you just click the icon and Spark starts.
Setting Phantom to factory default ereased the files and I could setup again as normal.
I guess the Bluetooth hacking was used for this purpose as I found information about Bluetooth devices which couldn't been blocked on my Mac. Bluetooth hacking can be used by the neighbour because the distance is limited.
So watch your neighbours.
Reply


Messages In This Thread
Hacker used Phantom memory... - by steenh - 03-Oct-2016, 10:49
RE: Hacker used Phantom memory... - by dmitrek - 03-Oct-2016, 10:52
RE: Hacker used Phantom memory... - by steenh - 03-Oct-2016, 11:38
RE: Hacker used Phantom memory... - by ragwo - 03-Oct-2016, 12:00
RE: Hacker used Phantom memory... - by steenh - 03-Oct-2016, 16:36
RE: Hacker used Phantom memory... - by ragwo - 03-Oct-2016, 16:47
RE: Hacker used Phantom memory... - by steenh - 03-Oct-2016, 16:52
RE: Hacker used Phantom memory... - by ragwo - 03-Oct-2016, 20:55
RE: Hacker used Phantom memory... - by steenh - 04-Oct-2016, 09:27
RE: Hacker used Phantom memory... - by dkoretz - 09-Oct-2016, 18:37

Forum Jump:


Users browsing this thread: 1 Guest(s)