Friday, January 10, 2025
HomeData BreachMobile Hacking Company "Cellebrite" Hacked and 900 GB Of Logins, Log Files...

Mobile Hacking Company “Cellebrite” Hacked and 900 GB Of Logins, Log Files Relesed by Hackers

Published on

In the latest case of a hacking company being hacked, details by the crew that claims to have spirited away login info and other data from the cell phone-cracking company.

According to a report from the Motherboard, an unnamed hacker has breached Cellebrite’s systems and managed to steal 900 Gb of data. The data includes the customer usernames and passwords, the data collected by the company from various mobile devices, and other technical information of the company.

All the stolen files and data is reportedly traded in some IRC chat rooms, but the hacker claims that he did not leak the data to the public. The motivation of the hacker is still not clear, but he seems to have dome this against the changes in surveillance legislation and the “recent stance taken by Western governments.”

Cellebrite said  , The data provided by the hacker is legitimate, confirmed Motherboard. They also said that one of their external servers had been accessed by an unauthorized party.n

The company launched an investigation team and the analysis suggested that an attacker has breached their server that is storing a legacy backup of the Cellebrite firm’s end-user license management system.

The company had previously migrated to a new user accounts system,” Cellebrite stated. “Presently, it is known that the information accessed includes basic contact information of users registered for alerts or notifications on Cellebrite products and hashed passwords for users who have not yet migrated to the new system. To date, the company is not aware of any specific increased risk to customers as a result of this incident; however, my.Cellebrite account holders are advised to change their passwords as a precaution.”

Cellebrite advised customers to change their passwords as a precaution and added that it is working with relevant authorities to assist in their investigation.

Access to Cellebrite’s systems has been traded among a select few in IRC chat rooms, according to the hacker.

“To be honest, had it not been for the recent stance taken by Western governments no one would have known but us,” the hacker told Motherboard. The hacker expressed disdain for recent changes in surveillance legislation.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the...

Weaponized LDAP Exploit Deploys Information-Stealing Malware

Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake...

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has...

Hackers Targeting Users Who Lodged Complaints On Government portal To Steal Credit Card Data

Fraudsters in the Middle East are exploiting a vulnerability in the government services portal....

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

PowerSchool Hacked – Attackers Accessed Personal Data of Students and Teachers

Walker County Schools has reported that unauthorized access to personal data belonging to students...

United Nations Aviation Agency Hacked Recruitment Data Exposed

The International Civil Aviation Organization (ICAO), a United Nations agency responsible for coordinating global...

APT32 Hacker Group Attacking Cybersecurity Professionals Poisoning GitHub

The malicious Southeast Asian APT group known as OceanLotus (APT32) has been implicated in...