Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Citizen Lab finds Cellebrite tool used on mobile phone of Kenyan activist in police custody

Grandstream GXP1600 VoIP phone exposed to unauthenticated remote code execution

Celebrating 35 years of battery recycling leadership

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Citizen Lab finds Cellebrite tool used on mobile phone of Kenyan activist in police custody
Identity

Citizen Lab finds Cellebrite tool used on mobile phone of Kenyan activist in police custody

userBy userFebruary 18, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 18, 2026Mobile security/spyware

A new study by Citizen Lab has found evidence that Kenyan authorities used a commercial forensic extraction tool made by Israeli company Celebrite to hack into the mobile phones of prominent dissidents, the latest incident of technology abuse targeting civil society.

The Interdisciplinary Research Unit at the University of Toronto’s Munk School of International Affairs and Public Policy announced that it discovered these indicators on the personal cellphone of Boniface Mwangi, a Kenyan pro-democracy activist who has announced plans to run for president in 2027.

Specifically, Cellebrite’s forensic extraction tool was found to have been used on a Samsung mobile phone that was in police custody following his arrest in July 2025.

The phone was returned to him almost two months later in September, at which point Mwangi realized it was not password protected and could be unlocked without the need for a password. Cellebrite’s technology has been rated with high reliability for use in phones on or about July 20 and July 21, 2025.

“Cellebrite could have been used to completely extract all materials from Mwangi’s devices, including messages, private materials, personal files, financial information, passwords, and other sensitive information,” Citizen Lab said.

The latest findings follow another report released last month, in which researchers said Jordanian authorities likely used Cerebrite to extract information from the cellphones of activists and human rights defenders who criticized Israel and expressed support for Palestinians in Gaza.

The devices were seized by Jordanian authorities during detention, arrest, and interrogation, and subsequently returned. According to Citizen Lab, the documented incidents occurred between late 2023 and mid-2025.

In response to the findings, a spokesperson for Celebrite told the Guardian that the company’s technology is only used to “access personal data in accordance with legal due process or with appropriate consent to legally assist investigations after an incident has occurred.”

These two incidents add to the body of evidence documenting the misuse of Cellebrite technology by government customers. It also reflects a broader ecosystem of surveillance abuses by various governments around the world, using mercenary spyware such as Pegasus and Predator to enable targeted surveillance.

Predator spyware targeting Angolan journalists

This development is consistent with another Amnesty International report that found evidence that the iPhone of Angolan journalist and press freedom advocate Teixeira Candido was targeted by Intellexa’s Predator spyware after opening an infected link received via WhatsApp in May 2024.

The iPhone was running iOS 16.2. This is an older version of the operating system with known security issues. At this time, it is unknown what exploit was used to cause the infection. In multiple reports published last year, Recorded Future revealed that it had observed suspected Predator operations in Angola dating back to 2024.

“This is the first forensically confirmed use of the Predator spyware to target Angola’s civil society,” the international human rights organization said. “Once the spyware is installed, the attacker has unrestricted access to Teixeira Cândido’s iPhone.”

“The Predator spyware infection appears to have lasted less than a day, and was removed when Teixeira Candido’s phone was restarted on the evening of May 4, 2024. From that point until June 16, 2024, the attackers attempted to reinfect his device by sending him new malicious Predator infection links 11 It appears that all of these subsequent attack attempts failed, perhaps because the link was simply not opened.

According to an analysis published by French offensive security firm Reverse Society, Predator is a commercial spyware product “built for reliable, long-term deployment” that allows operators to selectively enable or disable modules based on target activity, giving them real-time control over surveillance activities.

Predator was also found to include a variety of undocumented analysis prevention mechanisms, including a crash reporter monitoring system for forensic countermeasures and a SpringBoard hook to suppress recording indicators from victims when microphones and cameras are activated, demonstrating the sophistication of the spyware. Additionally, there are explicit checks to avoid running in US and Israeli locales.

“These findings demonstrate that Predator operators have detailed visibility into failed deployments. […] “This error code system transforms failed deployments from black boxes to diagnostic events,” said Jamf Threat Labs researchers Shen Yuan and Nir Avraham.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGrandstream GXP1600 VoIP phone exposed to unauthenticated remote code execution
user
  • Website

Related Posts

Grandstream GXP1600 VoIP phone exposed to unauthenticated remote code execution

February 18, 2026

Critical flaws found in four VS Code extensions with over 125 million installs

February 18, 2026

Operating in a Permanently Unstable World

February 18, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Citizen Lab finds Cellebrite tool used on mobile phone of Kenyan activist in police custody

Grandstream GXP1600 VoIP phone exposed to unauthenticated remote code execution

Celebrating 35 years of battery recycling leadership

This former Microsoft chancellor thinks he can defeat CyberArk within 18 months

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.