Skip to content

Commit

Permalink
Exploding hand-helds
Browse files Browse the repository at this point in the history
  • Loading branch information
ninabarzh committed Sep 26, 2024
1 parent 3849ec0 commit d7cf7e6
Show file tree
Hide file tree
Showing 2 changed files with 4 additions and 4 deletions.
4 changes: 2 additions & 2 deletions project/blog/templates/blog/pagers.html
Original file line number Diff line number Diff line change
Expand Up @@ -30,11 +30,11 @@ <h2>Interdiction</h2>

<p>Hardware supply chain attacks <a href="https://www.bunniestudios.com/blog/2019/supply-chain-security-talk/">are extremely hard to defend from</a>.

<p>Once the hardware is successfully modified, adversaries can use the back door to gain further access or exfiltrate data, it is extremely difficult to detect and fix, and gives long-term access. It is entirely possible that explosives planted in the pagers were detonated using a remote command, perhaps hidden in a pager message. But erm? there is not much space in the devices. Which explosives were that then?</p>
<p>Once the hardware is successfully modified, adversaries can use the back door to gain further access or exfiltrate data, it is difficult to detect and fix, and gives long-term access. It is entirely possible that explosives planted in the pagers were detonated using a remote command, perhaps hidden in a pager message. But erm? there is not much space in the devices. Which explosives were that then?</p>

<h2>Targeting costs</h2>

<p>To make it a targeted attack the attacker would need an operative to make sure he modified devices are delivered to the targets and not just anyone. This requires a mole, or a bribe. And time. How long does it take to infiltrate Hezbollah providers to the point of delivering hundreds of devices?</p>
<p>To make it a targeted attack the attacker would need an operative to make sure the modified devices are delivered to the targets and not just anyone. This requires a mole, or a bribe. And time. How long does it take to infiltrate Hezbollah providers to the point of delivering hundreds of devices?</p>

<h2>Why this attack?</h2>

Expand Down
4 changes: 2 additions & 2 deletions project/build/pagers/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -80,11 +80,11 @@ <h2>Interdiction</h2>

<p>Hardware supply chain attacks <a href="https://www.bunniestudios.com/blog/2019/supply-chain-security-talk/">are extremely hard to defend from</a>.

<p>Once the hardware is successfully modified, adversaries can use the back door to gain further access or exfiltrate data, it is extremely difficult to detect and fix, and gives long-term access. It is entirely possible that explosives planted in the pagers were detonated using a remote command, perhaps hidden in a pager message. But erm? there is not much space in the devices. Which explosives were that then?</p>
<p>Once the hardware is successfully modified, adversaries can use the back door to gain further access or exfiltrate data, it is difficult to detect and fix, and gives long-term access. It is entirely possible that explosives planted in the pagers were detonated using a remote command, perhaps hidden in a pager message. But erm? there is not much space in the devices. Which explosives were that then?</p>

<h2>Targeting costs</h2>

<p>To make it a targeted attack the attacker would need an operative to make sure he modified devices are delivered to the targets and not just anyone. This requires a mole, or a bribe. And time. How long does it take to infiltrate Hezbollah providers to the point of delivering hundreds of devices?</p>
<p>To make it a targeted attack the attacker would need an operative to make sure the modified devices are delivered to the targets and not just anyone. This requires a mole, or a bribe. And time. How long does it take to infiltrate Hezbollah providers to the point of delivering hundreds of devices?</p>

<h2>Why this attack?</h2>

Expand Down

0 comments on commit d7cf7e6

Please sign in to comment.