A hacker claims to have stolen hundreds of gigabytes of data from Cellebrite, the Israel-based mobile forensics company rumored to have helped the FBI hack an iPhone belonging to the terrorist Syed Rizwan Farook.
Vice’s Motherboard reported that an unnamed hacker breached Cellebrite’s systems and managed to steal 900 Gb of data, including customer usernames and passwords, databases, data collected by the company from mobile devices, and other technical information.
The stolen files were reportedly traded in some IRC chat rooms, but the hacker claimed he had not leaked the data to the public. The motives of the attack are unclear, but the hacker apparently decided to disclose the breach as a result of changes in surveillance legislation and the “recent stance taken by Western governments.”
Motherboard said the data provided by the hacker appeared to be legitimate and Cellebrite confirmed that one of its external servers had been accessed by an unauthorized party. The company has launched an investigation, but its initial analysis suggests that the attacker breached a server storing a legacy database backup of my.Cellebrite, the firm’s end-user license management system.
“The company had previously migrated to a new user accounts system,” Cellebrite stated. “Presently, it is known that the information accessed includes basic contact information of users registered for alerts or notifications on Cellebrite products and hashed passwords for users who have not yet migrated to the new system. To date, the company is not aware of any specific increased risk to customers as a result of this incident; however, my.Cellebrite account holders are advised to change their passwords as a precaution.”
The company is in the process of notifying affected customers and it has informed law enforcement about the incident.
Cellebrite provides data extraction and analysis capabilities to organizations in the intelligence, public safety, military and enterprise sectors. The firm says its Universal Forensic Extraction Device (UFED) has 40,000 deployments in more than 100 countries.
The company made the news last year when it was reportedly contracted by the FBI to help crack the iPhone 5C belonging to Farook, the terrorist who shot several people in San Bernardino, California. While some said Cellebrite did not hack Farook’s device, law enforcement agencies in the U.S. are believed to have spent millions of dollars on its services.
Cellebrite claims to vet its clients, but the data obtained by Motherboard from the hacker suggests that the firm has provided its services to regimes with poor human rights records, including Russia, the United Arab Emirates and Turkey.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Latest News
- Microsoft: No-Interaction Outlook Zero Day Exploited Since Last April
- US to Adopt New Restrictions on Using Commercial Spyware
- Hackers Earn Over $1 Million at Pwn2Own Exploit Contest
- GoAnywhere Zero-Day Attack Hits Major Orgs
- Australia Dismantles BEC Group That Laundered $1.7 Million
- ‘Grim’ Criminal Abuse of ChatGPT is Coming, Europol Warns
- Webinar Tomorrow: Understanding Hidden Third-Party Identity Access Risks
- GitHub Rotates Publicly Exposed RSA SSH Private Key
