Scroll Top

Software that the police use to break into your smartphone has been examined by a team led by Signal founder Moxie Marlinspike. They’ve found serious security holes and maybe unlawful strategies.

Moxie Marlinspike, the creator of Signal and a white hat hacker, claims in a blog post promoting his communicator Signal that it came out of thin air (Google Android and Apple iOS). He is referring to an analysis kit produced by the software company Cellebrite that has generated a lot of controversy. Moxie and his group thoroughly examined the software. They’ve discovered some significant security holes in the process. Signal is now threatening to use these gaps to its advantage.


Spy software designed for law enforcement

Founded in Petah Tikva, Cellebrite is an Israeli software firm. Founded in 1999 by Avi Yablonka, Yaron Baratz, and Yuval Aflalo, the firm is known for its expertise in tracking and managing mobile devices. Police and governments all throughout the world rely on their software products, “Physical Analyzer” and “UFED.” Theoretically, you won’t be able to get your hands on this program, and its inner workings remain a mystery.

The smartphone data extraction and searching processes are made possible by the Physical Analyzer and the UFED. Moxie Marlinspike elaborates that in order for that to occur, a Cellebrite user must have physical possession of the targeted smartphone. Cellebrite makes it impossible to access information over the web or cellular networks.

Cellebrite is a brand linked with authoritarian regimes that don’t place a high value on individual liberties. Authoritarian regimes in Belarus, Russia, Venezuela, and China are among its clients, as are death squads in Bangladesh and military juntas in Myanmar, as well as those in Turkey, the United Arab Emirates, and elsewhere who aim to mistreat and oppress their citizens, as Moxie details.

The Israeli firm previously stated that Cellebrite would be supporting the Signal app. Moxie swiftly reassured customers that Cellebrite would be unable to decipher their encrypted communications. The piece was short and sweet, summarizing the “open app, view messages” process that was automated by Cellebrite on an unlocked smartphone.


Hacking Cellebrite: a small glossary

You must comprehend a few terminologies and ideas in order to fully comprehend what Moxie Marlinspike achieved and why no legal system can or should utilize Cellebrite’s software as evidence in good faith.



UFED is a program by Cellebrite. It claims to circumvent the PIN, patterns, and passwords of locked devices in a “legal” manner. Multiple data collecting processes are intended to contextualize «legitimately» gathered data and piece together additional information from what is discovered. To this purpose, UFED should have “legitimate” access to up to 40 applications. In its most fundamental form, it is backup software. What Cellebrite wants you to know is that all of their actions are legal. Upon request, UFED is preinstalled on Panasonic ruggedized laptops. This is done to facilitate mobile data tapping.


Physical Analyzer

The Cellebrite software library also includes the Physical Analyzer. It interprets the information that UFED has gathered and displays it graphically. Moxie calls it a “frontend to adb backup,” which means it’s a pretty way to show that something has been backed up. Your smartphone’s data must be accessible to the physical analyser, which means it must have read access. Access to the Write Mode is optional but included. On request, Physical Analyzer can be shipped with a custom-configured workstation already loaded with the program. This should reduce the time it takes to process data broken by UFED. Both the UFED and the Physical Analyzer are frequently sold together. It’s unusual for a government or regime to buy UFED without also ordering a Physical Analyzer. The best way to describe it is as a spy version of the Microsoft Office suite.



ffmpeg can be downloaded and used for free by anyone. Since its creation in 2000, other software companies have expanded upon and integrated ffmpeg into dozens of their own projects. ffmpeg has many uses, including video conversion, trimming, and audio editing. In the realm of computer security, ffmpeg has earned a reputation for promptly disclosing and addressing numerous vulnerabilities. Even though there are many security flaws, this does not indicate that the software is necessarily dangerous. Certainly not! In addition, it may attest to the open and collaborative nature of the ffmpeg project’s development process. There are now 355 known vulnerabilities, as documented on the MITRE list. In principle, they should all be patched. If you rely on ffmpeg, you should always use the most recent version of the program.


Arbitrary Code Execution

One tactic employed by cybercriminals is known as arbitrary code execution, also known as arbitrary code injection. By taking advantage of a security hole, a hacker can force a program to run malicious code. Depending on how it’s written, the code might do everything from merely showing an error message to stealing sensitive information such as passwords and credit card numbers. This made-up alphabet is sometimes referred to as “particular code.” To use a technical term, it is formatted in a “unexpected fashion.” This happens when the susceptible program receives data it was not designed to process, causing it to behave erratically. I’ll give you an example: if you type in some sort of code into a search box, you’ll see an error notice.


Trusted/Untrusted Sources

In the context of computer programs, the term “trusted” or “untrusted” sources describes the reliability of a given information source. There must be mutual confidence between programs A and B for them to communicate. Programs generally concur that “Yes, I trust you won’t do anything evil with my data,” which is a reasonable assumption to make. Software A may entrust its data to another software it does not fully trust. That’s why we call them “unreliable” or “shady” sources. Generally speaking, smartphone users are the ones who make the most use of the trusted/untrusted source dichotomy. Apps downloaded from the App Store may be relied on as being safe to use. The source is suspect if you sideload it, which means you installed it yourself or got it from an unofficial store. Unless authorized by the user, software often does not permit communication with unknown or untrusted sources.


The Issues in Cellebrite’s software

Multiple vulnerabilities were discovered by Moxie’s study. There are two factors at play here:

  1. The security of Cellebrite’s own software does not appear to be a top priority.
  2. All hardware and software identify Cellebrite’s spyware as “untrusted.” This is due to the fact that UFED and Physical Analyzer must operate as “untrusted” even on a fundamental level. Since unauthorized backups and decryption are not features that the creators of Apple’s iOS or Google’s Android have integrated into their operating systems, no smartphone manufacturer will support the capability of Cellebrite products.

Nearly all of Cellebrite’s code, according to Moxie, “exists to parse untrusted input […].”

Cellebrite may face severe legal repercussions simply for the software’s classification as unreliable. Since the results cannot be believed if the data extraction procedure is “untrusted,” Its integrity is of utmost significance in the context of reliable evidence. If such software were to aim for the highest level of data integrity, it would need to be maintained current at all times. However, Moxie found in the code ffmpeg parts dated circa 2012. This has already made it possible for all kinds of heists to be carried out with Cellebrite’s data output.


Cellebrite flaunts its theft of Apple’s ideas

Furthermore, Team Signal has found AppleMobileDeviceSupport6464.msi and AppleApplicationsSupport64.msi within the Cellebrite package. Something obviously lifted from the Windows iTunes installer for the 2018 version by the Israeli business. This is strictly forbidden for Cellebrite. Apple validates the authenticity of its data and the identities of those authorized to access it, as well as the parameters under which such access is permitted. To extrapolate from Apple’s stance on data privacy, we can say with confidence that Cellebrite has used these files without authorization. It’s important to be “legitimate,” the Cellebrite website emphasizes. If Apple decides to sue Cellebrite, this might have repercussions.


Moxie wrecking Cellebrite

At least one arbitrary code execution vulnerability has been found by Moxie. In the event that a hacker does find such a flaw, they can take advantage of it in a number of ways. With Cellebrite’s help, Moxie has automated this procedure. Cellebrite’s software easily deciphers arbitrary coding, thus the Physical Analyzer and UFED can read and work with such files with no problems. That data can be integrated into any program. It gets worse; with just one file, Moxie may alter any and all reports generated by the Cellebrite software. And not just the current report, but all reports in the past and future as well. And this was accomplished without triggering any inconsistencies in the integrity checks. This signifies that Moxie has figured out how to store information in UFED and Physical Analyzer. This breaks the program entirely. Moxie demonstrates in a video how to fake a Cellebrite error message during a routine scan and then show a quote from the film “Hackers.” According to Moxie’s research, consumers of Cellebrite who care about the accuracy of their scans should steer clear of the company’s product.


Signal wishes to assist Cellebrite

White hat hackers, according to Moxie Marlinspike and Signal, carry a lot of responsibility. They wish to assist businesses in fixing and enhancing their software. even if the cause of the misery and death is software. However, Signal has made their assistance contingent upon Cellebrite fulfilling the following requirement: “Naturally, if Cellebrite does the same for any vulnerabilities they employ in their physical extraction and other services to their respective vendors, both now and in the future, we will appropriately share the exact vulnerabilities we are aware of to them.”

Additionally, Moxie has revealed that Signal will soon be adorned with aesthetic files in “totally unrelated news.” These files are solely there to make the app more visually appealing; they are not meant to interact in any way with Signal’s functionality. Even distribution of numerous, essentially distinct files into randomly installed apps has been announced by Signal. But Moxie informs us that they are all attractive. He states, “Aesthetics are vital in software.” If you don’t already have it, there’s a chance Signal will soon come preinstalled with the files required to hack Cellebrite.

Related Posts

Leave a comment