Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Critical Open VSX Registry Flaws expose millions of developers to supply chain attacks

Meta hires leading Openai researchers to tackle AI reasoning models

Office conversions for the 10 years this year are increasing every year

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Amnesty Finds Celebrity Light Zero Day, which is used to unlock Android phones for Serbian activists
Identity

Amnesty Finds Celebrity Light Zero Day, which is used to unlock Android phones for Serbian activists

userBy userFebruary 28, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 28, 2025Ravi LakshmananMobile Security / Zero Day

Cellebrite's Zero Day Exploit

According to a new report from Amnesty International, the 23-year-old Serbian youth activist had an Android phone targeting a zero-day exploit developed by Celebrity to unlock devices.

“One student protester’s Android phone was exploited and unlocked by a sophisticated zero-day exploit chain targeting Android USB drivers developed by Cellebrite,” the international non-governmental organization said, noting that traces of the exploit were discovered in another case in mid-2024.

Cybersecurity

The vulnerability in question is CVE-2024-53104 (CVSS score: 7.8) and is a case of privilege escalation of kernel components known as USB video class (UVC) drivers. The defective patch was addressed in the Linux kernel in December 2024. It was then dealt with it on Android earlier this month.

CVE-2024-53104 is believed to have been combined with two other defects, CVE-2024-53197 and CVE-2024-50302. Both of these are resolved in the Linux kernel. They are not included in Android Security Breaking News yet.

CVE-2024-53197 (CVSS score: N/A) – Access vulnerabilities in existing and MBOX devices.

“Targeting the Linux Kernel USB driver, Exploit now allows Cellebrite customers to bypass the lock screen of their Android phones to gain privileged access to their devices,” says Amnesty.

“This case draws on the wide range of legacy USB kernel drivers supported by the Linux kernel, highlighting how real-world attackers are leveraging the USB attack surface of Android.”

The activist, given the name “Vedran” to protect his privacy, was taken to a police station confiscated on December 25, 2024 after attending a student protest in Belgrade.

Cybersecurity

Amnesty analysis revealed that the exploit was used to unlock the Samsung Galaxy A32, and authorities tried to install an unknown Android application. The exact nature of the Android app remains unknown, but it coincides with previous Novispy Spyware infection modalities reported in mid-December 2024.

Earlier this week, Cellebrite said its tool is not designed to promote any kind of offensive cyber activity and will work proactively to reduce the misuse of its technology.

The Israeli company also said it would no longer allow Serbia to use the software, saying it “we have determined that at this time it is appropriate to cease use of the product by related customers.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMemeagent is attracting attention – Meet Chad, an AI agent who is changing the game
Next Article Tesla applies for a ride permit in California, but has a catch
user
  • Website

Related Posts

Critical Open VSX Registry Flaws expose millions of developers to supply chain attacks

June 26, 2025

Critical RCE flaws in Cisco ISE and ISE-PIC allow uncertified attackers to gain root access

June 26, 2025

The new filefix method appears as a threat following a 517% increase in clickfix attacks

June 26, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Critical Open VSX Registry Flaws expose millions of developers to supply chain attacks

Meta hires leading Openai researchers to tackle AI reasoning models

Office conversions for the 10 years this year are increasing every year

Jeff Bezos reportedly courts Trump after his release with Musk

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Digital Twin Revolution: Reshaping Industry 4.0

1-inch rollout expanded bug bounty features rewards up to $500,000

PhysicsX raises $135 million to bring AI-first engineering to aerospace, automobiles and energy

Deadline approach to speaker proposals for OpenSSL Conference 2025 held in Prague

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.