Cellebrite: New iPhones can't be hacked

Carding Forum

Professional
Messages
2,788
Reaction score
1,170
Points
113
Criminologists recognize problems with access to modern smartphones.

In April 2024, mobile forensics company Cellebrite ran into a problem: a significant portion of modern iPhones were inaccessible to their hacking tools, according to leaked documents confirmed by 404 Media.

The documents show which Android smartphones and OS versions Cellebrite can access, and give a detailed view of the current state of mobile forensic technologies.

The analysis of the documents was carried out after the FBI announced that it was able to access the mobile phone of Thomas Matthew Crookes, a suspect in the attempted assassination of Donald Trump. The FBI did not specify which brand of phone Crookes used or how the device was unlocked.

The documents, titled "Cellebrite iOS Support Matrix" and " Cellebrite Android Support Matrix ", were sent to 404 Media by an anonymous source. In May, GrapheneOS, an Android-based operating system focused on privacy and security, previously published screenshots of the same documents, but they did not receive widespread attention outside the mobile forensics community.

kcldi93lr200zgf860nzpvlkqnyeorxi.png

Table of supportedi Phones and versions

For all locked iPhones with iOS version 17.4 and later, Cellebrite documents indicate "In research", which means that models with this version cannot be unlocked using the company's tools.

For previous versions of iOS 17 (from 17.1 to 17.3.1), the iPhone XR and iPhone 11 models are supported. However, for iPhone 12 and later running on 17.1 – 17.3.1, it is marked "Coming soon", which means that support is"coming soon". Also for these versions of iOS, support for Supersonic BF (brute force) was recently added, which allows you to quickly access phones, according to the company.

According to Apple data for June, the majority of iPhone users upgraded to iOS 17 – 77% of all iPhones and 87% of iPhones released in the last 4 years are running on iOS 17.

Cellebrite offers a variety of tools for mobile forensics, including UFED, a hardware device that can extract data from a physically connected smartphone. UFED is widely used by the police. Cellebrite also sells Cellebrite Premium, a service that either provides UFED customers with more options, is processed in the Cellebrite cloud, or is offered as a standalone solution.

Cellebrite claims that Cellebrite Premium is able to get a password "for almost all modern mobile devices, including the latest versions of iOS and Android." However, leaked documents do not support this claim, showing that as of April 2024, Cellebrite could not access locked iPhones running iOS 17.4.

qiqdwog1jd2dcomjzle3qfjzerokwaf7.png

Table of supported Android devices

The second document shows that Cellebrite does not have full support for blocked Android devices, although it covers most of those listed. For example, Cellebrite can't apply brute force to Google Pixel 6, 7, or 8 if they are disabled.

Cellebrite confirmed the authenticity of the documents in an email to 404 Media. A company spokesperson said the documents are intended to help customers understand the capabilities of Cellebrite technologies when conducting ethical and legitimate investigations. The representative also noted that the company does not sell its products to countries that are under US, EU, UK or Israeli sanctions.

Cellebrite isn't the only company dedicated to mobile forensics. Grayshift makes a product called GrayKey, which was initially targeted at iOS devices and then expanded to Android. GrayKey's current capabilities are not clear. Magnet Forensics, which merged with Grayshift in 2023, did not respond to a request for comment.

The Cellebrite Android document also mentions GrapheneOS – a privacy - focused operating system. 404 Media specialists spoke to several people in the underground industry selling secure phones to criminals, who said that some of their customers have switched to using GrapheneOS in recent years. Google and Apple declined to comment on the situation.

Source
 
The FBI's second attempt to unlock the phone of the shooter who wounded Donald Trump during his rally near Pittsburgh, Pennsylvania, has been successful thanks to a new Cellebrite tool still in development.

The break-in took less than 40 minutes, but the feds found no evidence of criminal intent. The information they found also sheds no light on the motives of the young man who opened fire.

The only thing that can be linked to the tragic incident, and even then only tenuously, are photos of Trump, Biden and other officials that were found on the phone of a 20-year-old local resident. It also contained search results for the keyword “information about major depressive disorder.”

The FBI office in Pittsburgh has a license for Cellebrite software, which allows one to guess or bypass password protection on a mobile device. When it didn’t help, the Israeli IT company’s tech support provided access to the latest development, and with its help the goal was achieved.

According to what leaked to the media, the shooter had a Samsung, one of the newest models - possibly with Auto Blocker protection, which was recently significantly expanded.

Cellebrite's portfolio also includes another forensic tool, UFED, which the developer claims can be used to extract data from 20,000 different types of smartphones, including the iPhone.

It was recently revealed that Cellebrite is planning to expand its presence in the US by acquiring CyTech, which is allowed to participate in top-secret projects in the country.

Source
 
Top