Advertisement
News

Ghost, Encrypted Phone for Criminals, Was an ‘Absolute Mess’

A security researcher managed to pull a list of Ghost users, resellers, and even customer support messages from an exposed server. It shows how as organized criminals move to making their own encrypted platforms, they might make vulnerable products.
A photo of Ghost's homepage listing its features.
Image: Ghost.
🖥️
404 Media is an independent website whose work is written, reported, and owned by human journalists and whose intended audience is real people, not AI scrapers, bots, or a search algorithm. Sign up to support our work and for free access to this article. Learn why we require this here.

Law enforcement recently hacked into Ghost, an encrypted communications platform authorities allege was used by serious organized criminals, and gained access to user messages. Now independently of that, a security researcher has found multiple glaring issues with Ghost’s infrastructure, including ones that allowed him to pull a large list of Ghost usernames and customer support messages from a publicly exposed Ghost server, according to a copy of the researcher’s findings and multiple screenshots shared with 404 Media.

The news shows how as organized criminals move to making their own, smaller encrypted phone networks, those systems could be vulnerable to outside hackers or law enforcement.

When Ghost started to rely “on their own code, not that of an enterprise company, that’s when you see what an absolute mess it was,” Jamieson O’Reilly, founder and offensive security lead of cybersecurity company Dvuln, told 404 Media in an online chat.

Sign up for free access to this post

Free members get access to posts like this one along with an email round-up of our week's stories.
Subscribe
Advertisement