Researcher Finds New Vulnerabilities in Cellebrite's Tools

Researcher Finds New Vulnerabilities in Cellebrite's Tools

Encryption & Key Management , Forensics , Security Operations

Matt Bergin of KoreLogic Says Forensic Tools Need Regular Security Audits Jeremy Kirk (jeremy_kirk) • May 3, 2021    

Can courts trust evidence collected by Cellebrite's mobile device forensic tools?


See Also: Live Webinar | Empowering Financial Services with a Secure Data Path From Endpoint to Cloud


The question was posed late last month by Signal, the messaging app that is a recent new target for Cellebrite's data-collecting tools for law enforcement. Signal's founder, Moxie Marlinspike, contended that software vulnerabilities found in Cellebrite's tools could be used to tamper with evidence. As a result, one lawyer has already filed a motion for a new trial. (see: Signal Founder Says Cellebrite's Forensics Tools Flawed).


But Marlinspike isn't the only one who has taken a close look at Cellebrite's devices. On Friday, Matt Bergin of KoreLogic will present his latest findings - which relate to Cellebrite's Universal Forensic Extraction Device, or UFED - at the Black Hat Asia conference.


Bergin, a se ..

Support the originator by clicking the read the rest link below.