(no title)
TrueDuality | 2 months ago
A lot of this these "backdoor" style hypothesis' still need a motive justification for the cost. Who would they be targeting? What is the potential value of the backdoor?
Given the visibility and complex locations required for the firmware, this would be an expensive backdoor to put in place for any amount of time. The attack is completely untargeted, at best you may be able to say tech enthusiasts that travel. You probably can't count on executive targeting, this device requires a separate battery pack as well as per-site configuration as opposed to pairing to their iPhone and not carrying all that extra stuff.
What are the chances of an expensive, high-visibility backdoor showing up in a dirt cheap product line for a high-risk untargeted attack? Pretty low in my book but your threat model may vary.
daneel_w|2 months ago
It doesn't have to be targeted. The general demographic is a fantastic subject, and cheap affordable devices are a fantastic method. If one such trojan network device happen to end up in the home of an employee in a valuable position, or better yet in some office, an attacker has a chance to pivot further into a network.