Cellebrite director of forensic research Shahar Tal recently tweeted out that the company's Advanced Investigative Service can now unlock and extract the full file system for the iPhone 6 and iPhone 6 Plus (via CyberScoop
). To date, CAIS "supports lawful unlocking and evidence extraction" from the following iPhone generations: 4s, 5, 5c, 5s, 6, and 6 Plus. No mention has been made whether or not the developer has attempted to unlock newer-generation iPhones, including the iPhone 6s
, 6s Plus, 7, or 7 Plus.
The company reportedly charges $1,500 to unlock an individual phone and $250,000 for a yearly subscription to the data extracting service. In addition to the basic system and user data it can get, the hack also targets various apps within the iPhone, including personal data stored in Uber, Facebook, Chrome, and some dating apps.
At the same time this week, Cellebrite announced
the next generation of its "Content Transfer
" tool, which will allow retailers and operators to fully duplicate a customer's existing iPhone onto a brand new iPhone at an average content transfer speed of 1GB per minute. The developer said this should reduce wait times in stores while also pleasing anxious customers worried about losing data when upgrading to a new iPhone generation.
Cellebrite said the most important settings get transferred in the process, including wallpaper, alarm settings, weather, photos, videos, contacts, and apps. Not included are account passwords, Wi-Fi settings, health data, and website history. The company plans to hold a demonstration of the Full Transfer service for iPhones at Mobile World Congress in Barcelona, which runs next week from February 27 – March 2.
“With content transfer speeds averaging 1 GB per minute, this new service is a complete game changer.” said Yehuda Holtzman, CEO of Cellebrite Mobile Lifecycle. “With Full Transfer, the average iPhone customer with 10GB of personal data can walk out of the store with a mirror-image of their old iPhone in just 10 minutes, offering customer experience that’s far superior to anything else available today.”
Although the developer has been most recognizably in the public eye for its relation to the Apple-FBI
drama and its smartphone-cracking expertise, Cellebrite also offers a collection of services for retailers and businesses. Cellebrite Touch2
and Cellebrite Desktop
power in-store smartphones and desktop computers, respectively, with software that the company claims offers flexibility by operating through a store's existing IT infrastructure to "deliver a fast, consistent service."
Earlier in February, Cellebrite found itself at the hands of a hacker when someone stole and publicly released
a cache of Cellebrite's most sensitive data, including tools it uses to get into older iPhones. The hacker shared the data on Pastebin, intending to highlight the importance of the inevitability that any brute force tools aimed at bypassing encryption software "will make it out" into the public -- a prime fear of Apple CEO Tim Cook
when the FBI originally demanded the company create a backdoor into the San Bernardino shooter's iPhone 5c last year.