What's New

A Look Inside the Cellebrite Hack

By Nextrio on March 10th, 2017 Facebooktwittergoogle_plusredditlinkedinmailby feather

Hacking has become so commonplace in modern society that specialized hacking companies have come to exist as a byproduct of the constant thirst for information and data that has been created through the widespread use of computers and smartphones. Cellebrite is one such company that is most well-known for Universal Forensic Extraction Devices (UFEDs), which can rip data from mobile phones ranging from contact information to call logs to emails and more. Early this year, it was revealed that Cellebrite was itself the target of a major hack, making it another in a string of major attacks on companies specializing in hacking and surveillance.

How much data was taken?

Data appears to have been gathered from Cellebrite’s website, which is logged into by end users for software updates among other tools. In the 900 GB of data taken, there were email addresses and personal information of users as well as what appears to be data dumped from phones and Cellebrite devices.

How was the hack discovered?

Motherboard obtained the 900 GB of data in January and notified Cellebrite of the hack. Representatives from the company noted that they recently experienced unauthorized access to an external web server and is investigating the breach.

What happened next?

Cellebrite has done little to respond to the hack beyond issuing a statement advising customers to change their passwords and login information. It seems that the motive for the hack is a vigilante approach to a changing climate in government surveillance and privacy issues, so it may only be one of many to come within a shaky political climate.