The Register: Australian Police conducted supply chain attack on criminal collaborationware

Source URL: https://www.theregister.com/2024/09/18/afp_operation_kraken_ghost_crimeware_app/
Source: The Register
Title: Australian Police conducted supply chain attack on criminal collaborationware

Feedly Summary: Sting led to cuffing of alleged operator behind Ghost – an app for drug trafficking, money laundering, and violence-as-a-service
Australia’s Federal Police (AFP) yesterday arrested and charged a man with creating and administering an app named Ghost that was allegedly “a dedicated encrypted communication platform … built solely for the criminal underworld" and which enabled crims to arrange acts of violence, launder money, and traffic illicit drugs.…

AI Summary and Description: Yes

Summary: The Australian Federal Police (AFP) have made significant strides in dismantling a criminal communication network known as Ghost, which provided an encrypted platform for organized crime. By successfully infiltrating the app and executing a supply chain attack, the AFP executed raids leading to multiple arrests and the seizure of illicit goods. This operation highlights critical lessons in cybersecurity, particularly around encryption, supply chain vulnerabilities, and law enforcement’s evolving tactics.

Detailed Description:
The recent operation by the Australian Federal Police (AFP) against the Ghost app showcases essential insights into the intersection of technology, crime, and law enforcement responses. The Ghost app, reportedly designed for encrypted communication among criminals, was not merely a tool but rather a comprehensive platform facilitating various illicit activities. Here are some key points from the situation:

– **Nature of the Application**:
– Ghost was an encrypted communication platform specifically targeted at the criminal underworld, enabling users to coordinate criminal activities such as violence, money laundering, and drug trafficking.
– It was sold with a modified smartphone, complete with a subscription to a secured network.

– **Law Enforcement Actions**:
– The AFP identified and successfully infiltrated the Ghost network, which allowed them to gain intelligence and evidence against users.
– A notable tactic used was a supply chain attack, where the AFP modified software updates to implant backdoors into the app, providing access to the information on devices used in Australia.

– **Operational Impact**:
– This infiltration led to a large-scale operation across four Australian states resulting in 71 search warrants executed, 38 arrests, and significant seizures including 25 illicit weapons and 200 kilograms of drugs.
– The operation intervened in what the AFP described as 50 threatened acts of violence or murder, highlighting the severe implications of the criminal activities coordinated through the app.

– **Wider Implications**:
– This case illustrates the risks associated with encrypted communications, especially when they’re used for criminal activities.
– It raises questions about the balance between privacy and security, particularly regarding law enforcement’s ability to access encrypted communications without compromising overall cybersecurity.

– **Conclusion**:
– The AFP’s success illustrates the potential vulnerabilities in applications that claim to provide secure communication, reinforcing the significance of supply chain security and the need for vigilance against cybercriminal tactics.
– As technology evolves, so too must the approaches to security and compliance surrounding the development and use of such applications.

For professionals in security, privacy, and compliance, this case serves as a critical reminder that even the most secure systems can be subverted, and that proactive measures are necessary to mitigate risks in both design and deployment of encryption technologies.