Mattia Epifani, a forensics expert in Italy who has worked with Cellebrite technology, said police should be segregating their forensics tech from the main department network, so it shouldn’t be an issue, but the threat of evidence tampering was real. ![]() ![]() Worse, they could use it as a way to spy on police networks, if an officer plugs it right into their department’s network and the malware has the power to traverse across machines. If a criminal can hack a Cellebrite device by running a malicious file like the one described by Marlinspike, they could spoil evidence. This could be a severe issue for the many police agencies using Cellebrite across the world. Industry-standard exploit mitigation defenses are missing, and many opportunities for exploitation are present.” “We were surprised to find that very little care seems to have been given to Cellebrite’s own software security. “There are virtually no limits on the code that can be executed,” Marlinspike wrote. All the Signal creator had to do was include “a specially formatted but otherwise innocuous file in any app on a device that is subsequently plugged into Cellebrite and scanned.” Marlinspike found that the Cellebrite UFED device wasn’t taking proper protections when downloading data from a phone, so it was possible to install malware on the forensic tool.
0 Comments
Leave a Reply. |