Cellebrite can't crack iPhones running iOS 17.4 or later
Leaked documents claim that Cellebrite software used by law enforcement agencies cannot unlock any more recent models than 2018's iPhone XR if they've been updated to iOS 17.4.
Leaked documents claim that Cellebrite software used by law enforcement agencies cannot unlock any more recent models than 2018's iPhone XR if they've been updated to iOS 17.4.
Cellebrite, the firm behind forensic devices used by law enforcement agencies to access data on seized iPhones, attempted to keep its technology secrets hidden, by telling its users to keep the hardware's existence as "hush hush as possible."
A new report claims that 14 out of 15 US Cabinet Departments bought Cellebrite, the iOS unlocking technology, with the company saying 2,800 of its customers work in the government.
Because of a crippling vulnerability, Cellebrite disabled the iPhone data extraction feature on its Physical Analyzer tool.
The CEO of secure messaging app Signal has hacked a phone unlocking device made by Cellebrite, revealing critical vulnerabilities that could be used against police investigators.
U.S. public schools are acquiring forensic tools meant for police and military use to hack into student and faculty iPhones across the U.S.
Law enforcement agencies across the United States have tools to access data stored on encrypted iPhones, a report claims, with at least 2,000 agencies in the country now having the means to gain access to further their criminal investigations.
Multiple smartphone surveillance and data extraction companies, including iPhone hacking firm Cellebrite, are pitching their products to governments as an alternative method of tracking the spread of COVID-19.
Documents released to support the impeachment trial include information seemingly taken from an iPhone by Cellebrite — the firm believed to have performed similar extractions for the FBI.
Cellebrite, a digital forensic company known for assisting law enforcement in unlocking iPhones, is expanding its reach to other platforms, with the purchase of rival firm BlackBag adding PC and Mac forensic services to its portfolio.
Demands from the FBI and Attorney General William Barr for Apple to provide more help to the ongoing Pensacola shooter investigation did not need to be made, as security experts have pointed out the existence of hacking tools that could have granted access to locked iPhones — which law enforcement has at their disposal already.
Israeli mobile device forensics company Cellebrite proclaimed on Friday that it can break into any iOS device, including those running iOS 12.3.
Meant to be used only by law enforcement, Cellebrite hacking tools for iPhones and other smartphones are reportedly selling on eBay for sums as low as $100.
The iOS 11.4 beta contains a new feature called USB Restricted Mode, designed to defeat physical data access by third parties — possibly with forensic firms like Grayshift and Cellebrite in mind.
Cellebrite offers its services to law enforcement for the welfare of the public, an executive of the security firm known for breaking the security of iOS and other devices claims in an interview, while also stressing the firm's tools are not a major risk to the privacy of iPhone users in general.
Cellebrite, the Israeli security firm believed to have helped the FBI unlock an iPhone during the San Bernardino investigation, is claiming it is capable of bypassing the security of devices running iOS 11 and older versions, including recently launched hardware including the iPhone 8 and iPhone X.
Media reports are claiming that an iPhone 6 that was dredged out of the water in Spain has been unlocked by Cellebrite, and if accurate would be the first publicized report of Apple's Secure Enclave having been penetrated by third party hacking tools.
The FBI paid approximately $900,000 to a third party to help break into the iPhone 5c of San Bernardino shooter Syed Rizwan Farook, U.S. Senator Dianne Feinstein said recently when questioning FBI director James Comey at a Senate Judiciary Committee oversight hearing.
Cellebrite — the firm thought to be responsible for helping the FBI extract data from the iPhone of San Bernardino shooter Syed Rizwan Farook — is doing "lawful unlocking and evidence extraction" from Apple devices through the iPhone 6 and 6 Plus, according to the company's Forensics Research director.
Cellebrite, the digital forensics company believed to have helped the FBI break the security of the San Bernardino shooter's iPhone, may have repurposed other existing cracking tools used for jailbreaking iPhones, according to a new cache of files allegedly sourced from the security firm.
{{ summary }}