Advertisement
UK markets closed
  • FTSE 100

    7,895.85
    +18.80 (+0.24%)
     
  • FTSE 250

    19,391.30
    -59.37 (-0.31%)
     
  • AIM

    745.67
    +0.38 (+0.05%)
     
  • GBP/EUR

    1.1607
    -0.0076 (-0.65%)
     
  • GBP/USD

    1.2370
    -0.0068 (-0.55%)
     
  • Bitcoin GBP

    51,904.59
    +534.29 (+1.04%)
     
  • CMC Crypto 200

    1,385.54
    +72.91 (+5.56%)
     
  • S&P 500

    4,967.23
    -43.89 (-0.88%)
     
  • DOW

    37,986.40
    +211.02 (+0.56%)
     
  • CRUDE OIL

    83.24
    +0.51 (+0.62%)
     
  • GOLD FUTURES

    2,406.70
    +8.70 (+0.36%)
     
  • NIKKEI 225

    37,068.35
    -1,011.35 (-2.66%)
     
  • HANG SENG

    16,224.14
    -161.73 (-0.99%)
     
  • DAX

    17,737.36
    -100.04 (-0.56%)
     
  • CAC 40

    8,022.41
    -0.85 (-0.01%)
     

Signal booby-traps its own encrypted messaging app to hack its hackers

 (AFP via Getty Images)
(AFP via Getty Images)

Encrypted messaging service Signal has turned the tables on data extraction company Cellebrite, seemingly booby-trapping its own app to hack the hackers.

The messaging company published a blog post that reported numerous alleged vulnerabilities in Cellebrite software, which uses physical access to a smartphone to breach its contents.

Signal was able to exploit holes in Cellebrite’s code to execute its own software on Windows computers used by Cellebrite. “There are virtually no limits on the code that can be executed,” Signal CEO Moxie Marlinspoke said.

Cellebrite make two products - UFED and Physical Analyzer - that have previously been used by authoritarian regimes including Russia and Belarus, the police in Myanmar, and the FBI in the United States attempting to breach iPhones.

ADVERTISEMENT

UFED creates a backup of the device onto a Windows computer, while the Physical analyzer parses the files in a way that is browsable for the user.

Cellebrite infamously claimed that they were able to breach Signal’s encryption – one of the most secure available – in December 2020, but Signal claims the company only added support to Physical Analyser for the file formats used by Signal, and thus were overstating their actual abilities.

“One way to think about Cellebrite’s products is that if someone is physically holding your unlocked device in their hands, they could open whatever apps they would like and take screenshots of everything in them to save and go over later. Cellebrite essentially automates that process for someone holding your device in their hands,” Marlinspike writes.

Exacting retribution by a “truly unbelievable coincidence”, Marlinspike writes, Signal gained access to Cellebrite’s hardware tools.

“I was recently out for a walk when I saw a small package fall off a truck ahead of me. As I got closer, the dull enterprise typeface slowly came into focus: Cellebrite”, Marlinspike writes.

It appears Signal was able to execute code using a “specifically formatted but otherwise innocuous file” in an app that’s scanned by Cellebrite – such as Signal, for example - to take over Cellebrite’s software.

“Any app could contain such a file, and until Cellebrite is able to accurately repair all vulnerabilities in its software with extremely high confidence, the only remedy a Cellebrite user has is to not scan devices”, the post continues.

“We are of course willing to responsibly disclose the specific vulnerabilities we know about to Cellebrite if they do the same for all the vulnerabilities they use in their physical extraction and other services to their respective vendors, now and in the future.

“In completely unrelated news, upcoming versions of Signal will be periodically fetching files to place in app storage. These files are never used for anything inside Signal and never interact with Signal software or data, but they look nice, and aesthetics are important in software”, Signal adds.

“We have a few different versions of files that we think are aesthetically pleasing, and will iterate through those slowly over time. There is no other significance to these files.”

The Independent has reached out to Signal for more information about the significance of these files, and how it came to access Cellebrite equipment, but the messaging app did not respond to a request for comment by time of publication.

Signal also alleges that Cellebrite uses two MSI installer packages that are digitally signed by Apple, but appear to have been extracted from the Windows installer of iTunes 12.

“It seems unlikely to us that Apple has granted Cellebrite a license to redistribute and incorporate Apple DLLs in its own product, so this might present a legal risk for Cellebrite and its users”, Signal writes.

Apple did not respond to a request for comment from The Independent before time of publication. The Independent also asked Cellebrite for more information about its possible vulnerabilities, as well as its Apple licenses, but the digital forensics company also did not respond before time of publication.

“We constantly strive to ensure that our products and software meet and exceed the highest standards in the industry so that all data produced with our tools is validated and forensically sound”, Cellebrite said in a statement to The Independent.

“Cellebrite understands that research is the cornerstone of ensuring this validation, making sure that lawfully obtained digital evidence is utilized to pursue justice.”

Read More

iPad Pro: How Apple made its new tablet – and what exactly it is

World’s first wooden satellite set to launch in 2021 in test of environmentally-friendly space exploration

Why is the PS5 out of stock?