Phone hacking firm Cellebrite gets hacked, 900 GB of user data stolen


And now in ironic news, Cellebrite, an Israeli company specializing in data extraction and phone hacking services for governments and law enforcement, has been hacked. Motherboard has obtained 900 GB of the company's data through an undisclosed source and has verified its legitimacy, with the company itself later confirming the data breach.

Cellebrite became famous after being linked to FBI's attempts to hack San Bernadino killer Syed Rizwan Farook's iPhone. Its main product is a device called the Universal Forensic Extraction Device (UFED), whose purpose is extracting data from locked mobile phones. According to Motherboard, the data appears to come partly from the company's my.cellebrite domain, the user section of their website, and includes pieces of evidence from hacked mobile phones, along with usernames and passwords for accessing the company's website.

The company issued a statement on its website confirming the data breach and stating that an investigation is underway. The press release claims the stolen information is from an older account database and includes basic contact information of some users and hashed passwords of those who haven't yet migrated to the newer system. The company is currently contacting affected customers, but still advises all users to change their passwords as a precaution.

The data leak reveals that, besides its ties to US law enforcement, the company has also worked for countries such as Russia, Turkey and the United Arab Emirates. While these countries are known for their authoritarian practices, the type of services Cellebrite has performed for them isn't yet publicly known.  

source: Motherboard via BBC News

FEATURED VIDEO

16 Comments

1. Podrick

Posts: 1285; Member since: Aug 19, 2015

Lmao!

10. trojan_horse

Posts: 5868; Member since: May 06, 2016

Lmao indeed! The hunter becomes the hunted. 900GB... LMFAO, SMH

2. bucky

Posts: 3785; Member since: Sep 30, 2009

Good.

3. SuperAndroid507

Posts: 361; Member since: Jan 06, 2014

Oh!, 2017 seems to be a an interesting year !

4. Marslander

Posts: 160; Member since: Jan 08, 2015

Damnit, Cellebrite, you had one job. ONE job!

5. Boybawang

Posts: 205; Member since: Jun 02, 2013

It's an Inside Job.

15. ibend

Posts: 6747; Member since: Sep 30, 2014

no.. it must be Russia

6. Plasticsh1t

Posts: 3108; Member since: Sep 01, 2014

7. Gsmalltheway

Posts: 275; Member since: Aug 15, 2009

First off, Cellebrite is not a hacking firm. Their product is for transferring info from one phone to another. All ATT, Tmobile, Verizon etc use their machines.

8. Gsmalltheway

Posts: 275; Member since: Aug 15, 2009

First off, Cellebrite is not a hacking firm. Their product is used in all ATT, Sprint, Verizon etc stores to transfer data from one phone to another

9. mikehunta727 unregistered

Recked LOL

11. lyndon420

Posts: 6793; Member since: Jul 11, 2012

Now THIS is funny!!! Lol.

14. Arch_Fiend

Posts: 3951; Member since: Oct 03, 2015

The hard part about hacking is doing it without leaving a trail and getting caught, a company like this is bound to figure who hacked them.

16. trojan_horse

Posts: 5868; Member since: May 06, 2016

"a company like this is bound to figure who hacked them." Not necessarily... There are hard-core hackers who are almost impossible to be traced.

17. GeekOFW

Posts: 59; Member since: Dec 14, 2016

Keyword is "almost".

18. cassy5001

Posts: 2; Member since: Oct 18, 2016

if you need a professional hacker for various hacking needs, i recommend globalhackteam35@gmail.com. they render a very good service and they are very good at hacking various things, phones,Facebook, whatsapp, twitter, calls, emails, websites, social medias and many more. i have used this service before so i vouch for them. contact them via email globalhackteam35@gmail.com

Latest Stories

This copy is for your personal, non-commercial use only. You can order presentation-ready copies for distribution to your colleagues, clients or customers at https://www.parsintl.com/phonearena or use the Reprints & Permissions tool that appears at the bottom of each web page. Visit https://www.parsintl.com/ for samples and additional information.