Drive Badger project is a set of tools for stealth data exfiltration – which means, for copying data from someone's computer or mobile device to external USB drive. In most cases, without knowledge or consent of the owner.
Because of technical limitations, Drive Badger project is divided into 2 separate products, sharing the same source code, but run in a different way:
That's true. Unlike many other tools from IT security area, Drive Badger is not a Proof-of-Concept kind of tool, bringing some groundbreaking techniques. Everything, what Drive Badger does, can be as well run manually, step by step.
Instead, what Drive Badger really does, is doing it all better, by putting the maximum focus on:
So, the real purpose of Drive Badger is to change the economics of covert data exfiltration attacks (make them more affordable), by reducing the overall risk of the operation, and also by lowering the entry threshold for the operator, who no longer needs to have IT background.
Pegasus is a very expensive, and therefore exclusive solution. Both for targeted subjects, and for potential operators.
Most countries buy between 20 and 50 tracking licenses, no matter if they choose Pegasus, DevilsTongue, RCS or any other commercial solution. This fact will always limit its use only against the most dangerous criminals.
From your individual perspective as an officer, you either are the lucky guy who has been granted access, or not. And you either can use Pegasus as your career booster, or not. In 99.9% cases, NOT. And this is not your decision.
On the contrary, Drive Badger is fully open source project. You get all the software and manuals for free. What you need, is:
So you can use Drive Badger just like any other private, non-standard equipment, to improve your work results. This is only your decision.
See Cayman National: Hyper-V exfiltration case study - it brings the detailed performance analysis of exfiltration of big part of Cayman National bank's IT infrastructure.
Wrong. Please see hooks.
Hooks analyze each copied partition - and if particular files are found, they are analyzed and Drive Badger can use information extracted from them to exfiltrate network shares as well:
wcx_ftp.ini
files by Total Commandersmbfs
/cifs
and nfs
shares mounted statically in /etc/fstab
filesWhile Drive Badger's main functionality is data exfiltration, it is also able to make changes to the copied filesystem: create files or directories, write data into them, rename, delete etc. - as long as processed drive/filesystem is writable.
This feature is called filesystem injection and is done by "injectors". See injectors-playground repository for example scripts.
No. I created Drive Badger and Mobile Badger for purely ideological reasons. I have money for living, and I don't sell anything here.
Of course, I'm open for sponsoring either Drive Badger or my other open source projects - but it's your individual, voluntary decision, whether to donate anything.