Skip to content
Tomasz Klim edited this page Jul 23, 2021 · 14 revisions

What is Mobile Badger?

Mobile Badger is a subproject of Drive Badger, dedicated for data exfiltration from:

  1. Mobile devices (all brands and models that connect to the computer using USB, and support either MTP or PTP protocol for transferring data):
  • Android phones, tablets and possibly other devices
  • iOS-based devices (iPhone, iPad)
  • Windows Phone 8/10 (Lumia phones)
  • BlackBerry OS phones
  1. USB Mass Storage devices:
  • mobile devices not supporting MTP/PTP, eg. BlackBerry Tablet OS (QNX)
  • mobile devices configured as mass storage (older phones, mp3 players etc.)
  • external USB drives
  • internal drives connected via USB bridge (eg. pulled from computers, where standard Drive Badger cannot be run, because all USB ports are damaged)

Unlike many tools from IT security area, Mobile Badger is not a Proof-of-Concept kind of tool, bringing some groundbreaking techniques. Everything, what it does, can be as well done manually.

The purpose of both Drive Badger and Mobile Badger is to change the economics of covert data exfiltration attacks - make them more affordable, by reducing the overall risk of the operation, and also by lowering the entry threshold for the attack operator.

Stay current

Legal information

This software was written and is meant to be used only by eligible entities, eg:

  • police officers
  • special agents
  • intelligence officers
  • military forces
  • private investigators
  • corporate red teams
  • diplomats or other people with personal immunity

Its usage is always a subject to local legislation, and the user is solely responsible for all potential law infringements and/or misfeasances of duties.

Intention of this product, is not an incitement for a crime. Rather, Drive Badger is mainly intended to be used in countries, where using such tools is legal, or at most, can be a subject to possible disciplinary action between the end user and his/her employer.

Clone this wiki locally