4TB of confidential data, firmware code of Cellebrite TFS and Cellebrite Mobilogy leaked. UFED tool can be used to unlock any iPhone or Android

A threat actor has leaked 4TB of confidential data from Cellebrite an Israeli digital intelligence company. Cellebrite is an Israeli company specialized in providing forensic tools to security forces and companies, such as extracting data from an encrypted iPhone or Android mobile. It offers services to collect, review, analyze, and manage digital data. Its tools are used by law enforcement agencies worldwide. 

4TB of proprietary data from 🇮🇱 @Cellebrite (Cellebrite Mobilogy & Cellebrite TFS backup) leaked by anonymous source.

Notably, Cellebrite Mobilogy shares code with Cellebrite Universal Forensics Extraction Device or Cellebrite UFED, used by law enforcement agencies. pic.twitter.com/jclPzo9YLd

— Soufiane Tahiri (@S0ufi4n3) August 4, 2022

Cellebrite Universal Forensic Extraction Device has similar firmware as Cellebrite Mobilogy. The threat actor has leaked 3.6 TB of data of both  these tools. They are mainly used for device diagnostics, content transfer, backup, and restoration. Cellebrite UFED allows lawfully access locked devices with ease, Bypass pattern, password or PIN locks and overcome encryption challenges quickly on popular Android and iOS devices. It also allows collecting data from mobile phones, drones, SIM Cards, SD cards, GPS devices and more. It selectively collects cloud tokens and recover data of many apps without password.  You can see the video to understand more details

Another cyber attack targeted Cellebrite Team Foundation Server’s backup files leaking 430 GB of data. Team Foundation Server is like Azure DevOps Server used by the Cellebrite DevOps  team. In January 2017 a threat actor hacked into cellebrite and leaked

Read more

Explore the site

More from the blog

Latest News