mamot.fr is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mamot.fr est un serveur Mastodon francophone, géré par La Quadrature du Net.

Server stats:

3.5K
active users

Cory Doctorow

The "lawful interception" industry is a hive of scum and villainy: these are powerful, wildly profitable companies who search out defects in widely used software, then weaponize them and sell them to the world's most brutal dictators and death squads.

Their names are curses: The NSO Group, Palantir, and, of course, Cellebrite, who have pulled publicity stunts like offering $1m bounties for exploitable Iphone defects that can be turned into cyberweapons.

1/

Late last year, Cellebrite announced that they'd added "support" for Signal to their top-selling cyberweapons, UFED and Physical Analyzer. The announcement was deliberately misleading, claiming to have "cracked the encryption" (they haven't and can't do this).

Now, Signal founder Moxie Marlinspike has turned the tables on Cellebrite in a delicious act of security analysis, which he wrote up in detail on Signal's corporate blog:

signal.org/blog/cellebrite-vul

2/

Signal MessengerExploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app's perspectiveCellebrite makes software to automate physically extracting and indexing data from mobile devices. They exist within the grey – where enterprise branding joins together with the larcenous to be called “digital intelligence.” Their customer list has included authoritarian regimes in Belarus, Russi...

As Marlinspike explains, the job of Cellebrite's tools is to ingest untrusted input - the files from a seized mobile device - and parse them. This is a very dangerous task: "This is the space in which virtually all security vulnerabilities originate."

Incredibly, Cellebrite's programmers do no input sanitizing, just trusting all the files they receive and passing them from subroutine to subroutine.

3/

What's more, these subroutines call on wildly out-of-date software with dozens - even hundreds - of known vulnerabilities.

For example, the version of ffmpeg that Cellebrite bundles in its products was last patched in 2012; and more than *one hundred* security updates have been released since then.

Marlinspike's investigation turned up other sources of shame and liability for Cellebrite, including pirated libraries from Apple's Itunes software, which he documents in detail.

4/

Marlinspike intimates that he turned up more vulnerabilities than he enumerates in his analysis, but he is not making the kind of "responsible disclosure" to Cellebrite that is common among "white hat" security researchers.

Rather, he's made an offer to fully disclose his findings to Cellebrite only if they make a binding promise to engage in the same kinds of disclosures with the software they analyze - to pledge to help to patch bugs, rather than weaponizing them.

5/

And in a move of pure petard-hoisting, Marlinspike describes a proof-of-concept attack on Cellebrite, a corrupted file that can execute code on the Cellebrite device that will alter all future *and* past reports, "with no detectable timestamp changes or checksum failures."

He says that these doctored files could corrupt Cellebrite data "at random, and would seriously call the data integrity of Cellebrite’s reports into question."

6/

As proof of his proof-of-concept, he includes a video (intercut with scenes from the movie HACKERS) in which a Cellebrite device slurps up files from an Iphone and then displays his victory message: "MESS WITH THE BEST, DIE LIKE THE REST. HACK THE PLANET!"

Marlinspike closes out the report by announcing some "completely unrelated news," that future versions of Signal will periodically pull functionally useless, "aesthetically pleasing" files and store them, inert, on users' devices.

7/

The implication is that Marlinspike is now in possession of a vast trove of zero-day exploits for Cellebrite products, and he is seeding those exploits in the wild on hundreds of millions of devices, booby-trapping them should they ever be plugged into a Cellebrite device.

8/

The further implication is that any Cellebrite customer who encounters one of these booby-traps in the wild will lose the ability to trust *all* the data they *ever* retrieved with a Cellebrite product, and will never be able to trust that product again.

Yum!

eof/