Cellebrite’s high-tech hacking tools that are used by police are super-easy to hack
Who hacks the hackers?
You might have heard of Israel-based hackers-for-hire Cellebrite, who create smartphone hacking tools that then get used by law enforcement and government agencies worldwide, as well as repressive regimes and other unsavory characters
Signal got hold of a Cellebrite UFED device, and their analysis showed some serious security issues, where “industry-standard exploit mitigation defenses [are] missing,” with multiple opportunities to exploit the device.
You can see some of those hacks in action below, with Signal showing the UFED device showing a benign message from the 90s movie, Hackers, as a proof of concept. In reality, the vulnerability that led to that message could let any payload run on the UFED, potentially corrupting every scan that device had in memory from other smartphones, or even planting faked evidence.
With the vulnerability only needing the UFED to read a file on the device, anyone with the technical know-how could keep a self-destruct file on their device in case it ever ends up in the hands of Cellebrite or any organization/agency that uses their services.
That could go even further, as Phobos Group founder Dan Tentler says this method could be used to infect a government agency, by baiting them into “reading a phone loaded with the exploit,” which would then be transferred to a networked computer to read the files the Cellebrite device pulled off the phone. Yikes.
- A new Geico breach means hackers might have your driver’s license number
- A ‘Counter-Strike’ bug lets hackers control your PC with just a simple Steam invite
- Facebook doesn’t think it should tell you if you were part of a 533 million user breach
- Hackers are trolling wannabe cheaters in Call of Duty: Warzone with malware disguised as cheats