The Israeli company Cellebrite, specializing in the development of forensic solutions, which, like other Israeli companies, is often accused of using its products to spy on journalists and human rights defenders, suffered from data leaks.
As it is known, about 1.7 TB became public, which were placed on the Enlace Hacktivista network.
Another 103 GB of data from the Swedish forensic company MSAB also leaked. Both data archives are available for download both via torrents and directly from Enlance Hacktivista and DDoSecrets.
Given the ambiguous applicability of specialized equipment for collecting data from phones associated with violations of the rights of activists of other anti-government dissidents, both companies have repeatedly been targeted by various hacktivists and informants.
Cellebrite UFED (Universal Forensics Extraction Device) is one of the company's most popular services used by both law enforcement agencies and intelligence agencies to unlock and access data from confiscated mobile devices.
According to Enlace Hacktivista, on January 13, an anonymous user sent them phone examination software and documentation from two companies.
Neither Enlace Hacktivist nor DDoSecrets made any statements about the authenticity and source of the data, as well as about the identity of the informant.
Nevertheless, the 1.7 TB archive shared by the whistleblower seems to contain the entire set of Cellebrite programs, including the company's famous UFED, licensed tools, Physical Analyzer and Physical Analyzer Ultra, as well as Cellebrite Reader.
In addition, a number of files with technical guidance and documentation for customers were included in the archive.