Cellebrite tools can't crack iPhones running iOS 17.4 or newer; most Android devices vulnerable

midian182

Posts: 9,970   +131
Staff member
In brief: Apple and CEO Tim Cook will likely be feeling quite smug following a report that Israeli company Cellebrite's widely used phone-unlocking tools are ineffective against up-to-date iPhones. On the other hand, Cellebrite's kit can break into the majority of Android phones.

Cellebrite's Universal Forensic Extraction Device (UFED) is widely used by law enforcement agencies to unlock phones and extract their data. A recent report claims the company's technology helped unlock the phone of Thomas Matthew Crooks, the man who almost assassinated Donald Trump, just two days after the shooting. It was never revealed what model of phone Crooks had.

The Cellebrite iOS Support Matrix, obtained by 404 Media, reveals that the company still has not managed to break into iPhones running iOS 17.4 (launched on March 5) or later – the document lists them as still being "in research."

The document also reveals Cellebrite cannot break into most iPhones running iOS 17.1 to 17.3.1. However, the company recently added support for the iPhone XR and iPhone 11 lines running these iOS versions as hardware vulnerabilities in the handsets make them exceptions. The table lists the status of iPhone 12 and newer models running iOS 17.1 to 17.3.1 as "coming soon," suggesting support is on the way.

MacRumors reports that Apple's own data from June showed 77% of all iPhones and 87% of iPhones introduced in the last four years are running a version of iOS 17.

Most Android devices are vulnerable to Cellebrite's tools, but there are some exceptions, including the Google Pixel 6, 7, and 8, which cannot be broken into if obtained while powered off – the cold-boot process blocks the exploit used.

Samsung phones running Android 6 are also safe if they are turned off when obtained, but those running Android 7 to 14 are fully supported. Other phones running Android 7 to 14 can also be compromised by Cellebrite's brute force attack.

Cellebrite relies on identifying vulnerabilities in iOS and Android that allow its tools to crack locked devices. One method it uses is overriding systems that limit the number of passcode attempts on a device.

Permalink to story:

 
Except now they are saying the shooter’s Andriod phone was unlocked with an unreleased version so it may fare better against the latest iOS.

I’d still choose Apple for security but it is a cat and mouse game.
 
Except now they are saying the shooter’s Andriod phone was unlocked with an unreleased version so it may fare better against the latest iOS.

I’d still choose Apple for security but it is a cat and mouse game.

If they can't crack an iphone now, they likely leave it for a couple of months, until a new vulnerability and that phone is still running an older iOS version. They will get it eventually.

Other then that: iphone's are superior in regards of safety, privacy and such.
 
10000x more chance of being hit by a car than having your phone cellebrited if you are a nobody
Much easier ways for bad people to access your phone,
Someone just taking your phone is a greater threat especially if held
Probably more important to not be so vulnerable to loss of your phone , to access accounts, if your sole pay system , 2FA

Ultimately you want your protection to your social accounts, bank , documents. ID
, photos etc completely agnostic of your device

Plus if you die you need love ones to access it
You want to lock your car/house , but you want to be able to break in

Most people are scammed through social engineering, so much easier anyway

Wonder how Oxygen /Lineage fare etc
Plus if you were somebody, surely you would encrypt all communication , documents etc - I know still leaves logs/traces
 
"Cellebrite tools can't crack iPhones running iOS 17.4 or newer"

If I worked for Israeli Intelligence that's exactly what I'd say too.
 
Back