Last week the news came that the cell phone of Justice Minister Sergio Moro had been invaded by hackers. The attacker would have gained access to Telegram messages for six hours, but nothing had been publicly disclosed.
Only last Sunday (09) was the subject again debated, when The Intercept – played by Glenn Greenwald in the Snowden case – released a series of messages from the now ex-judge with the lawyer and also a member of the Delta Dallagnol Jet Lava, in conversations revealing the troubled backstage of the operation.
It is not known if these two cases have a relationship, but Moro and Dallagnol claim to be the victim of hacking attacks. The Telegram, on the other hand, ensures that it is not your fault.
Asked by a journalist, the company’s official profile stated that there is no evidence of a malicious attack on its servers, suggesting that the information may have been obtained through malware on one of the parties’ mobile phones, or via simpler social engineering. lack of authentication on two factors.
Leaked Carwash messages spark calls for Justice Minister Sergio Moro to resign in Brazil https://t.co/gQ0pUvfmCZ
— Bloomberg (@business) June 11, 2019
It is worth remembering that Telegram encryption works with the guarantee of the “shuffling” of the information from the moment they leave one device and arrive at another one whose sender has chosen to receive them. Only the devices in this conversation have the keys to the correct organization of the data.
Another possibility that is being debated, but not by Telegram, is the possibility of the invader (s) having used SIM Swap. In this case, a quantity of information about the owner of a telephone line is raised, such as RG, CPF, addresses, and then a fraudster contacts the carrier pretending to be the owner of the number and asks for a chip exchange. With the retrieval of the number in another SIM, the chances of an attack are magnified, since many security checks for service access use the phone as confirmation.
Glenn Greenwald in his Twitter has already stated that only a part of the obtained content has been published, and that “information of public relevance” will be taken without interference in personal and intimate subjects, showing that regardless of the method used by the source that passed the information to the vehicle, the amount of data was massive.