- Twitch streamer inadvertently documents all the times she was sexually, verbally harassed on vacation 2 Years Ago
- Raptors coach Nick Nurse becomes a relatable meme 2 Years Ago
- Man wears bandage that blends in with his skin tone, and Twitter has all the feelings 2 Years Ago
- The 8 best Korean sunscreens to add to your bag Today 12:15 PM
- New ‘Avengers: Endgame’ commercials drop a few big spoilers Today 11:58 AM
- 11 party games for people sick of playing Cards Against Humanity Today 11:45 AM
- Curvy Wife Guy makes the most Curvy Wife Guy pregnancy announcement Today 11:31 AM
- ‘A Fortunate Man’ is a gorgeous, shallow adaptation of a classic novel Today 11:30 AM
- Obama’s ‘Easter worshippers’ tweet upsets conservatives Today 11:04 AM
- Trump responds to impeachment calls: ‘You can’t’ Today 10:43 AM
- Desperate YouTuber goes on ‘holy pilgrimage’ to meet PewDiePie Today 10:33 AM
- Influencer faces 20 years for hiring cousin to threaten man into giving up domain name Today 10:17 AM
- ‘Avengers: Endgame’ isn’t actually the end of Marvel’s Phase 3 Today 10:12 AM
- ‘Star Trek: Discovery’ just obliterated every stupid argument about its place in canon Today 9:24 AM
- ‘Game of Thrones’ brings us lots of horny Tormund memes Today 8:46 AM
Cellebrite, a company known for selling law enforcement cellphone-hacking technology, has itself fallen victim to cybercriminals.
Motherboard reports hackers leaked to its journalists 900GB of Cellebrite data, including “customer information, databases, and a vast amount of technical data regarding Cellebrite’s products.”
An Israel-based firm, Cellebrite Mobile Synchronization Ltd. has subsidiaries in numerous countries, including Brazil, Singapore, Germany, and the United States. The company has been owned by Japan’s Sun Corporation for roughly a decade.
During the dispute between the FBI and Apple over default encryption last spring, Sun Corporation’s stocks soared 20 percent after Reuters reported Cellebrite was aiding the FBI in unlocking the iPhone of San Bernardino shooter Syed Farook. Another 17 percent spike occurred after the FBI announced it had successfully hacked into the device. (Washington Post national security reporter Ellen Nakashima subsequently reported the FBI hadn’t used Cellebrite’s technology.)
A device sold by Cellebrite, known as a Universal Forensic Extraction Device, or UFED, is used by American law enforcement, as well military and intelligence, to extract and decode digital evidence from mobile devices. In 2013, the company discontinued its popular “UME 36 Pro” model, replacing it with the more expensive ($2,199) “Cellebrite Touch.”
According to Cellebrite’s website, the Touch utilizes “logical and physical extraction methods to support more than 7,900 profiles for mobile devices including BlackBerry, Apple iOS, Android operating systems and smartphones from Samsung, Motorola, Microsoft, Palm, and Nokia.”
Motherboard journalist Joseph Cox reports the 900GB of stolen data appears to have been taken “at least in part” from the company’s website server. “The cache includes alleged usernames and passwords for logging into Cellebrite databases connected to the company’s my.cellebrite domain,” Cox wrote.
In a statement on Thursday, Cellebrite confirmed it had detected “unauthorized access to an external web server.” The company is currently working to determine the extent of the breach, it says.
Dell Cameron was a reporter at the Daily Dot who covered security and politics. In 2015, he revealed the existence of an American hacker on the U.S. government's terrorist watchlist. He is a co-author of the Sabu Files, an award-nominated investigation into the FBI's use of cyber-informants. He became a staff writer at Gizmodo in 2017.