
The hackers were able to steal 1.7 TB of data from the Israeli mobile forensics company Cellebrite, which offers tools for law enforcement agencies to collect, review, analyze, and manage digital data. The trove of data is currently available for download from DDoSecrets and the official Enlace Hacktivista websites.
According to Enlace Hacktivista, the Cellebrite data was provided to them by an “anonymous whistleblower.” An announcement published by Enlace Hacktivist on its page read that an anonymous whistleblower sent them phone forensics software and documentation from Cellebrite on January 13.
The data is currently being offered for downloading through torrents and direct downloads. The data includes the entire Cellbrite suite and a huge trove of files used for software localization and customer technical guides.
Notably, Cellebrite is frequently criticized for assisting governments in spying on the activities of journalists, government employees, dissidents, and activists for human rights.
One of Cellebrite’s most well-known services is the UFED (Universal Forensics Extraction Device), used by law enforcement and intelligence agencies worldwide to access data from mobile devices seized during investigations.
Cellebrite is renowned for unlocking smartphones with passcode protection, including iOS and Android models, and obtaining their data. The company stated in 2019 that its brand-new tool could open “almost any iOS and Android device. According to reports, Cellebrite also significantly impacted the 2016 unlocking of the San Bernardino iPhone.
© 2025, Lyonsdown Limited. teiss® is a registered trademark of Lyonsdown Ltd. VAT registration number: 830519543