The #Encrochat Story: Anatomy of an Illegal Exploit
- The DigitalBank Vault
- Apr 9, 2023
- 4 min read

A well-known executive in the digital forensics industry who requested anonymity speculated that the exploit deployed by French cyber cops was an over-the-air attack like the type that has made Israeli spyware firm, NSO Group, infamous.
“This sounds like some vulnerability that allowed getting into the device over the air and then once you run on the phone via remote code execution, you basically control it and can get all the data both stores on the device and in transit, so you basically bypass the peer to peer encryption as you run on the device itself.”
Deploying this OTA attack via cyber-exploits that require targets to click on one or zero clicks, NSO’s ‘Pegasus’ exploit has been linked in media reports to the phone hacking of drug lord “El Chapo,” slain Saudi journalist and alleged Qatari intelligence asset Jamal Khashoggi, Amazon chief Jeff Bezos, and most recently by Vice, to politicians in Spain.
Via a spokesperson, NSO denied all involvement in the Bezos hacking and the Khashoggi affair. “NSO software is operated in line with our industry-leading governance policies solely by authorized government agencies to fight terror and serious crime, and protect public safety,” said the spokesperson.
As far as the EncroChat hack is concerned, Major Prat also noted, “I don’t know the technical details of Pegasus, so I can’t speak to that.”
Nevertheless, the OTA attack vector indeed seems possible, as the Encrophone.com website, which marketed EncroChat’s “worry free secure communications,” advertised an OTA service that enabled “enhancements, patches, and features” to be “securely added directly to the Android Operating system of a subscriber device.”
Meanwhile, cybersecurity expert Richard Stiennon, the chief research analyst for infosec firm IT-Harvest, posited that EncroChat’s Dutch sim card vendor may have cooperated with authorities and helped them infect the cryptophone network with the CERBERUS exploit.
An EncroChat associate expressed Stiennon’s exact hypothesis to Vice, in fact. But the forensics executive discounted this possibility. “I don’t think the telecom company had any significant involvement,” he said.
Data Cyber Defense Technologies
Desktop and Mobile
Encryption Machines
Anti Interception
Anti Espionage
Anti Hacking
Anti Spyware
Anti Location Tracking
Anti Forensic Data Extraction
Anti Tapping
Anti Remote Digital Surveillance
In Cooperation with
Samsung Military Division
Encrypted Cipher Phones € 990 Euro
One Lifetime Payment
No Subscription Fees
Unlimited Calls & Messaging
Worldwide Delivery
We are here to help you achieve absolute secrecy!
and understand your privacy needs !
“ Air Gapped” iPhones.
Mobile Encryption Machines :
The Highest Level of Cyber Defense for Secret Critical Data.
Mathematically Unbreakable Quantum Safe Encryption
PRIVACY IS LUXURY
SECRECY IS PRICELESS
Ultra Encrypted Communications

We are here to help you achieve absolute secrecy!
and understand your privacy needs !
CIPHER SYSTEMS &
MOBILE ENCRYPTION MACHINES
Used by Billionaires, CEOs, VIPs, Celebs, Royals, WallStreet Sharks, Bitcoin Whales

No Subscription Fees
Unlimited Calls and Messaging
Worldwide Shipments Payment by Paypal
Full Refund Guarantee
ENCRYGMA.COM CIPHER PHONES
WhatsApp/Telegram/Signal/Viber
+372 5734 7873
If you need to communicate top classified information, transfer secret data or store sensitive files , you need an Anti Espionage and Anti Interception ENCRYGMA.COM Cipher Phone .
The ENCRYGMA.COM Mobile Cipher Machine is an above “Government Level”, Quantum Safe Encryption, mathematically uncrackable, no matter how much computational power is applied.
The Above Video has been posted by hackers that tried to extract information from our iPhones, in a "physical" way, by taking apart the device and trying to retrieve the data , directly from the chip that integrates the DBV Hardware Encryption Engine.
Consult with our
Cyber Defense Experts at :
Visit us today at :
SECRECY IS PRICELESS
Offline “ Air Gapped” Super Encryption Mobile Machines.
SECRECY IS PRICELESS
Offline “ Air Gapped” Super Encryption Mobile Machines.
How it works ? Watch the video below 👇
Cyber War Grade, Mathematically UnCrackable, Quantum Safe, Air Gapped (Offline) Encryption Machines More details ? Click here: ENCRYGMA.com .
“ If you need to communicate top classified information or you need to store secret data and be absolutely sure that no state-sponsored hackers, no foreign Governments , no intelligence agencies will be ever able to decipher the files, you need an Above Military Level Offline SuperEncryption System”
Penetration testings:
“Untraceable, Near to UnHackable, ‘Perfect Secrecy’ Communications, more secure than a face to face meeting “ : Modus Operandi of Top secret ultra encrypted data transfer between two remote Offline Cipher Machines.
Imagine this “covert communications” scenario : Bob wants to send Alice an extremely confidential text message.
He is encrypting the message on his Air Gapped ( Offline) Mobile Encryption Machine . The encrypted message is transformed into a QR Code, then with an online connected device , Bob scan the QR code generated from his offline encryption machine .
This QR code containing the encrypted message is then posted by Bob’s online connected device, on an anonymous Instagram account that is then visited by Alice, who owns the same Offline Cipher Machine .
Alice then scan the QR code from the Instagram post and decipher it , totally offline, on her own encryption system that is powered by the same set of encryption algorithms of Bob’s system.
What just happened here is called “ Perfect Secrecy “.
✅ An OTP Ciphered information ( mathematically uncrackable encryption) has been delivered to a remote receiver without ever sending the receiver , directly, anything.
✅ Leaving no direct digital trace online of any type of communications between the two parties .
✅ All the encryption and decryption process happens on disconnected devices , therefore any online cyber attacks are near to impossible.
✅ Encryption Keys 🔐 used, are freshly created for each individual communication session , generated by the user, never stored on the device or ever exchanged with the receiving party.
✅ All data is permanently erased from the offline cipher machines.
Cyber Defense Advisors ✅
WhatsApp/Telegram/Signal/Viber +372 5734 7873
More details about our Military Encrypted iPhones , please visit : https://www.digitalbank.capital/encrygma
Cyber War Ultra Encrypted Communications.
More details? Consult with our cyber defense advisors
at info@DigitalBankVault.com
or visit ENCRYGMA.com
Visit us today at :
Comments