Cellebrite gets hacked; some of its methods for unlocking phones are made public?

Cellebrite gets hacked; some of its methods for unlocking phones are made public?
Cellebrite, the company whose devices allow users to unlock handsets, was hacked last month and 900GB of data was whisked away by a hacker. Today, the hacker started releasing some of the files which include methods for cracking open Android, BlackBerry and some older iOS models. Some of the data made public might have come from publicly available phone cracking devices.

The hacker claims to have stolen the content from a remote Cellebrite server. Even though it was encrypted to protect the company, the hacker was able to bypass this protection. Most of the files posted started with UFED (which is an acronym used by Cellebrite for  its "Universal Forensic Extraction Device") followed with the name of a smartphone manufacturer such as Samsung, or BlackBerry.

According to forensic scientist Jonathan Zdziarski, some of the files revealed that parts of Cellebrite's machines use methods to unlock iOS devices that were created by the jailbraking community. Zdziarski says that if  Cellebrite used these community-devised tools, it would mean that the company's scientific products actually contain "forensically unsound and experimental software."


Cellebrite has released a statement claiming that no source code has been released by the hacker. "The files referenced here are part of the distribution package of our application and are available to our customers." Cellebrite added that it often monitors the latest research which includes "newly published forensic methods, research tools and publicly documented issues, including "jailbreaks," which enable platform research."

The company was rumored to have helped the FBI unlock the Apple iPhone 5c belonging to deceased terrorist Sayed Farook.

source: Motherboard via MacRumors

FEATURED VIDEO

14 Comments

1. Subie

Posts: 2424; Member since: Aug 01, 2015

Oh, the irony!

2. TechieXP1969

Posts: 14967; Member since: Sep 25, 2013

The US did it!

3. Mreveryphone

Posts: 1849; Member since: Apr 22, 2014

Damn...

4. airoid

Posts: 132; Member since: Dec 13, 2016

Hacker got hacked ,;

5. TheHeartBreakKid

Posts: 102; Member since: Jul 07, 2015

The hunter is hunted.

6. phonehome

Posts: 812; Member since: Dec 19, 2014

There is a reason it's called SOFTware.

7. sissy246

Posts: 7129; Member since: Mar 04, 2015

Nothing is safe.

14. Zylam

Posts: 1822; Member since: Oct 20, 2010

The 3310 is safe.

8. avinash22i

Posts: 72; Member since: Nov 07, 2013

This is just funny man.

9. lyndon420

Posts: 6878; Member since: Jul 11, 2012

Forensically sound or not...got the job done. Anyone dare to guess how long before all of our digital money disappears from whatever servers they're stored in? Will it be this year or maybe 2018? It's coming...

13. Zylam

Posts: 1822; Member since: Oct 20, 2010

LOLOLOL

10. mikehunta727 unregistered

This is great for Apple actually and other oem's though as now they can study these tools heavily and patch their OS/accordingly/go from there

11. Unordinary unregistered

Tim Cook warned against this EXACT FXxxng THING. A master key that will get into the wrong hands for everyone to use

12. Zylam

Posts: 1822; Member since: Oct 20, 2010

LOL it was probably Apple hacking them to find out how they hacked Apple's iPhone! The vicious cycle.

Latest Stories

This copy is for your personal, non-commercial use only. You can order presentation-ready copies for distribution to your colleagues, clients or customers at https://www.parsintl.com/phonearena or use the Reprints & Permissions tool that appears at the bottom of each web page. Visit https://www.parsintl.com/ for samples and additional information.