NoGoolag
4.54K subscribers
13.2K photos
6.89K videos
587 files
14.1K links
Download Telegram
Israeli phone hacking company faces court fight over sales to Hong Kong

"The workers inside the company didn't join to help the Chinese dictatorship," says one human rights lawyer.

Human rights advocates filed a new court petition against the Israeli phone hacking company Cellebrite, urging Israel’s ministry of defense to halt the firm’s exports to Hong Kong, where security forces have been using the technology in crackdowns against dissidents as China takes greater control.

In July, police court filings revealed that Cellebrite’s phone hacking technology has been used to break into 4,000 phones of Hong Kong citizens, including prominent pro-democracy politician and activist Joshua Wong. He subsequently launched an online petition to end Cellebrite’s sales to Hong Kong, which gained 35,000 signatures.

https://www.technologyreview.com/2020/08/25/1007617/israeli-phone-hacking-company-faces-court-fight-over-sales-to-hong-kong/

#Asia #HongKong #Cellebrite
Revealed: Israeli Firm Provided Phone-hacking Services to Saudi Arabia

A representative of
Cellebrite, which states that it has complied with the rules, flew to Riyadh from London last November, and at the request of the Saudi prosecutor’s office hacked into a Samsung cellphone

In November of last year, a representative of the Israeli firm Cellebrite landed at King Khaled International Airport in the Saudi capital, Riyadh. The man, a foreign national whose identity is known to TheMarker, Haaretz’s sister publication, arrived on a commercial flight from London to hack into a phone in the possession of the Saudi Justice Ministry. The details of the visit were agreed upon before the hacker landed.

The staff at Cellebrite demanded of the Saudis that their employee be met at the Riyadh airport by a government representative. They insisted that he pass through passport control without his passport being stamped and without an inspection of the electronic equipment that he would have with him, which they demanded would not leave his possession and only which he would use.

From there, it was agreed in advance that the hacker would be immediately taken to an isolated hotel room, where the Saudis committed not to install cameras – and where the job of hacking and copying information from a mobile cellphone was carried out. When the work was completed, Cellebrite’s representative returned to the airport and flew back to London.

Cellebrite is not the only Israeli company to provide hacking or other cybersecurity services to the Saudi kingdom, but it is apparently the only one that does so without any oversight from the Israeli Defense Ministry.

👀 👉🏼 https://www.haaretz.com/israel-news/tech-news/.premium-revealed-israeli-firm-provided-phone-hacking-services-to-saudi-arabia-1.9161374

👀 👉🏼 https://twitter.com/haaretzcom/status/1306233686761889798

#israel #hacking #samsung #cellebrite #saudiarabia
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Israeli Spy Tech Firm Says It Can Break Into Signal App Previously Considered Safe From Hacking

Cellebrite claims its tech can now crack Signal, which is regarded as the most encrypted app and is commonly used by journalists to communicate with sources

Israeli phone-hacking firm Cellebrite can now break into Signal, an encrypted app considered safe from external snooping, it claimed in a blog post on Thursday. Meanwhile, a U.S. report revealed Friday that American school districts have also bought the firm’s technology.

Cellebrite’s phone-hacking technology is intended for law enforcement agencies and is sold across the world. However, critics have long slammed the company for selling its wares to states with poor human rights records, from Indonesia and Venezuela to Belarus and Saudi Arabia.

https://www.haaretz.com/israel-news/tech-news/.premium-israeli-spy-tech-firm-says-it-can-break-into-signal-app-previously-considered-safe-1.9368581

https://www.cellebrite.com/en/blog/cellebrites-new-solution-for-decrypting-the-signal-app/

#signal #cellebrite #decrypting #app
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@NoGoolag
📡
@BlackBox
Signal app's Moxie says it's possible to sabotage Cellebrite's phone-probing tools with a booby-trapped file
https://www.theregister.com/2021/04/21/signal_cellebrite

Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app's perspective
https://signal.org/blog/cellebrite-vulnerabilities


#cellebrite
Forwarded from GJ `°÷°` 🇵🇸🕊 (t ``~__/>_GJ06)
I Have a Lot to Say About Signal’s Cellebrite Hack | Center for Internet and Society
https://cyberlaw.stanford.edu/blog/2021/05/i-have-lot-say-about-signal%E2%80%99s-cellebrite-hack

#Signal #Cellebrite #MobileForensics
Lock and wipe on emergency.

You can use PanicKit, tile,shortcut or send a message with a secret code. On trigger, using Device Administration API, it locks a device and optionally runs wipe (factory reset). Or it can send a broadcast message instead of the wipe.

Also you can:

fire when a device was not unlocked for X time
fire when a USB data connection is made while a device is locked
fire when a fake messenger app is launched
fire when a duress password is entered (companion app: Duress)
The app works in Work Profile too, but with limitations. Use it to install risky apps and Wasted in it. Then you can wipe this profile data with one click without wiping the whole device.

For base security take a look at: Sentry.Only encrypted device may guarantee that the data will not be recoverable.

Be aware that the app does not work in safe mode
.

Wasted (Lock a device and delete its data in an emergency)
https://f-droid.org/packages/me.lucky.wasted/
https://github.com/x13a/Wasted

#security #cellebrite #UFED
Wipeout! Detecting Android Factory Resets – The Binary Hick – 2021

During testing the devices were wiped using two different methods:  via the Android UI and via Recovery.  After the wipes, the phones were setup as both new and restored from backups.
As far as tools, a few different ones were used:
DB Browser for SQLite (3.12.2)
Autopsy (4.17.0)
Cellebrite UFED (7.45.1.43)
Cellebrite Physical Analyzer (7.46.0.64)
TextMate for macOS (2.0.19)
Android Triage Tool (1.2)


#Cellebrite #UFED
Some recent cases of Spanish government mafias using israeli #spyware against other gangs or population.
Some Spanish politicians including the president and the minister of war were also targeted by other country government mafias
#pagasus #cellebrite


Hacienda adquiere un 'software' israelí para cribar datos en el móvil de los contribuyentes
https://theobjective.com/economia/2024-01-11/hacienda-software-espia-israel-contribuyente/

La CNMC usa en secreto un 'software' policial israelí para clonar móviles de empresarios
https://theobjective.com/espana/2023-07-06/cnmc-software-cellebrite-clonar-moviles/

La UE rechaza investigar el 'caso Pegasus' porque ya está en los tribunales de España
https://theobjective.com/espana/tribunales/2023-12-12/ue-pegasus-tribunales-espana/