evil maid attack

back to index

description: a security attack where an adversary gains physical access to an unattended device to compromise it

3 results

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

by Kevin Mitnick, Mikko Hypponen and Robert Vamosi  · 14 Feb 2017  · 305pp  · 93,091 words

. It’s designed to unlock your encryption key only after confirming that your bootloader program hasn’t been modified. This is a perfect defense against evil maid attacks, which I will describe shortly. You can set BitLocker to unlock when you power up or only when there’s a PIN or a special

your data, for a dedicated government, it might not pose much of a challenge. Years ago researcher Joanna Rutkowska wrote about what she called an evil maid attack.16 Say someone leaves a powered-down laptop whose hard drive is encrypted with either TrueCrypt or PGP Whole Disk Encryption in a hotel room

Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks

by Scott J. Shapiro  · 523pp  · 154,042 words

were still years away. Even more confusing was the world of hacking, a place teeming with tricky lingo. Honeypots? Sinkholing? Fuzzing? Shellcode? Mimikatz? Evil maid attacks? WTF is an evil maid attack?! It all seemed opaque, unintelligible, and impossibly abstract. But I was becoming increasingly aware that I wouldn’t be able to do my day

, head of media relations for T-Mobile, stating the obvious. Speculation ran rampant on who did it and how. One possibility discussed was an “evil maid” attack. In an evil maid attack, someone who has physical access to a digital device compromises data manually. An evil maid (or a bald butler) could have taken Paris Hilton

sprang up: Steve Hargreaves, “Paris Hilton Hacking Victim?,” CNN Money, May 2, 2005, money.cnn.com/2005/02/21/technology/personaltech/hilton_cellphone/?cnn=yes. “evil maid” attack: Zidar mentioned T-Mobile’s investigation included the “possibility that someone had access to one of Ms. Hilton’s devices and/or knew her account

Google security alert; spoofing; viruses exploiting; worm in; see also phishing EMPACT ENIAC Equifax espionage; see also cyberespionage Estonia ethical hacking, see white-hat hacking “evil maid” attack Facebook famines Fancy Bear: Bitcoin use by; Bitly use by; DNC hack by; Google accounts phishing by; GRU origins of; hacking mistakes of; heuristics exploited

Dark Mirror: Edward Snowden and the Surveillance State

by Barton Gellman  · 20 May 2020  · 562pp  · 153,825 words

about the NSA documents, or to steal the digital files. The two of us talked through a well-known information security scenario known as the evil maid attack, which relies on brief physical access to a computer to steal its encryption credentials. The Snowden files, as it happened, were at that time locked