A while ago I reported that Israel-based mobile phone forensics company Cellebrite was hacked by unknown actors. At the time, it was said that only customer data was stolen. It now appears that this is no longer the case. In the last couple of days, a data dump has appeared online containing tools for extracting data from older iPhones, Android phones, and BlackBerry phones. Motherboard has the details:
Cellebrite is an Israeli firm which specializes in extracting data from mobile phones for law enforcement agencies. The company’s flagship product, the Universal Forensic Extraction Device (UFED), typically comes as a small, laptop-sized device, and can pull SMS messages, emails, and more from thousands of different mobile phone models. The investigator needs to have physical access to the phone to analyze it.
A Motherboard investigation found that US state police and highway patrol agencies have collectively spent millions of dollars on Cellebrite technology.
The hacker claimed to have taken the newly released data from a remote Cellebrite server, and said they had extracted them from UFED images. They told Motherboard that the files were encrypted, likely in an attempt to protect Cellebrite’s intellectual property, but that they managed to bypass the protections.
“The ripped, decrypted and fully functioning Python script set to utilize the exploits is also included within,” the hacker wrote in a README file accompanying the data dump. The hacker posted links to the data on Pastebin.
It’s not clear when any of this code was used in the UFED. Many of the directory names start with “ufed” followed by a different type of phone, such as BlackBerry or Samsung.
In their README, the hacker notes much of the iOS-related code is very similar to that used in the jailbreaking scene—a community of iPhone hackers that typically breaks into iOS devices and release its code publicly for free.
Well, that’s going to make Apple, not to mention Google and BlackBerry really happy as those tools will allow them to make countermeasures against this sort of thing. Researchers are likely happy as they get to troll this info for anything interesting. You can copy and past that statement for hackers as well as they will want to use the info to make exploits. But it’s safe to say that Cellebrite is likely not happy as they’re clearly using techniques that are already in the public domain, which takes away their “street cred.”
Oh, to quote the late Steve Jobs, there’s one more thing:
“@FBI Be careful in what you wish for,” the hacker’s message reads, before signing off with a piece of ASCII art, which says “Backdoorz.”
If you recall, Apple made the point when fighting the FBI’s attempts to get them to unlock the San Bernardino Shooter’s iPhone last year was that anything that it did had the risk of becoming public which would put iPhone users everywhere at risk. It now seems that this has come true. One wonders what the blow back will be from this.
AURO Expands Support for SaaS Providers With New “Tools for Applications”
Posted in Commentary with tags AURO on February 3, 2017 by itnerdAURO, the first Canadian enterprise public cloud, announced an expansion of their cloud computing Software as a Service (SaaS) marketplace with their new “Tools for Applications” program created specifically for SaaS and cloud-based application customers.
AURO Cloud Computing, a complete public cloud designed to meet the requirements of next-generation cloud-based, scale-out applications such as social apps, mobile apps, SaaS/PaaS deployments and Big Data analytics.
As AURO is Canadian-based, every customer benefits from their 100% Canadian cloud environment. AURO provides SaaS customers with variable services and compliance programs to help meet strict uptime, governance and support requirements for mission critical workloads. The Tools for Applications program includes compliance standards based on AT101 SOC 2 Type 2, PHIPA and ISO 27002 certifications.
Every SaaS customer on AURO’s public cloud benefits from the ability to test their ideas at a low cost with the ability to scale up as needed. With AURO, users also have the ability to leverage multiple cloud availability zones in Canada, including Toronto, ON and Vancouver, BC. Customers get instant access to industry-leading tools like cloud load balancers, cloud databases, object and block storage.
AURO was built on the premise that many SaaS and cloud-based customers are concerned about vendor lock-in that could potentially limit them to one cloud provider unless they are willing to spend time and money to recode an application. With AURO, everything is powered by OpenStack and will remain compatible through the use of open standards – there is no vendor lock-in. AURO is highly redundant and offers cloud computing, networking and storage with full API compatibility.
Starting February 1st, all new SaaS customers can receive at least one month of cloud credits and may qualify for even more with AURO’s SaaS initiative to get Canadian applications and services in the cloud. To learn more, contact AURO via email at sales@auro.io or by phone at 1-855-226-4678.
Leave a comment »