{"id":41753,"date":"2021-07-14T14:57:31","date_gmt":"2021-07-14T14:57:31","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32466\/Cellebrite-Under-Fire-Again-After-Being-Used-To-Target-Journalist.html"},"modified":"2021-07-14T14:57:31","modified_gmt":"2021-07-14T14:57:31","slug":"cellebrite-under-fire-again-after-being-used-to-target-journalist","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cellebrite-under-fire-again-after-being-used-to-target-journalist\/","title":{"rendered":"Cellebrite Under Fire Again After Being Used To Target Journalist"},"content":{"rendered":"<figure class=\"sc-1eow4w5-1 dhDQnh align--bleed js_lazy-image js_marquee-assetfigure\" data-id=\"16413671ce6743bca67fb226c3a910b5\" data-recommend-id=\"image:\/\/16413671ce6743bca67fb226c3a910b5\" data-format=\"jpg\" data-width=\"5472\" data-height=\"3078\" data-lightbox=\"true\" data-recommended=\"false\" contenteditable=\"false\" draggable=\"false\">\n<div class=\"sc-1eow4w5-2 loxZOX img-wrapper\" contenteditable=\"false\" data-syndicationrights=\"true\" data-imagerights=\"getty\" data-hidecredit=\"false\"><span class=\"sc-1eow4w5-0 dnhHtZ js_lightbox-wrapper\"><\/p>\n<div class=\"sc-1eow4w5-3 lktKQM image-hydration-wrapper\">\n<div><img decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" alt=\"Image for article titled Cellebrite Under Fire Again, After Cops Use Its Phone-Cracking Tech to Target a Journalist\" sizes=\" (max-width: 25em) calc(100vw - 32px), (max-width: 37.31em) calc(100vw - 32px), (min-width: 37.37em) and (max-width: 49.94em) calc(100vw - 32px), (min-width: 50em) and (max-width: 63.69em) 800px, (min-width: 63.75em) and (max-width: 85.19em) calc(66.5vw - 32px), 800px \" draggable=\"auto\" data-chomp-id=\"16413671ce6743bca67fb226c3a910b5\" data-format=\"jpg\" data-alt=\"Image for article titled Cellebrite Under Fire Again, After Cops Use Its Phone-Cracking Tech to Target a Journalist\" data-anim-src srcset=\"https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fill,f_auto,fl_progressive,g_center,h_80,pg_1,q_80,w_80\/16413671ce6743bca67fb226c3a910b5.jpg 80w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_140\/16413671ce6743bca67fb226c3a910b5.jpg 140w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_265\/16413671ce6743bca67fb226c3a910b5.jpg 265w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_340\/16413671ce6743bca67fb226c3a910b5.jpg 340w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_490\/16413671ce6743bca67fb226c3a910b5.jpg 490w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_645\/16413671ce6743bca67fb226c3a910b5.jpg 645w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_740\/16413671ce6743bca67fb226c3a910b5.jpg 740w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_965\/16413671ce6743bca67fb226c3a910b5.jpg 965w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_1165\/16413671ce6743bca67fb226c3a910b5.jpg 1165w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_1315\/16413671ce6743bca67fb226c3a910b5.jpg 1315w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_1465\/16413671ce6743bca67fb226c3a910b5.jpg 1465w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_1600\/16413671ce6743bca67fb226c3a910b5.jpg 1600w\"><\/div>\n<\/div>\n<p><\/span><figcaption class=\"sc-7s1ndr-0 bRZZJw no-caption\">Photo<!-- -->: <!-- -->JACK GUEZ\/AFP<!-- --> (<!-- -->Getty Images<!-- -->)<\/figcaption><\/div>\n<p><span data-id=\"16413671ce6743bca67fb226c3a910b5\" data-recommend-id=\"image:\/\/16413671ce6743bca67fb226c3a910b5\" data-format=\"jpg\" data-width=\"5472\" data-height=\"3078\" data-lightbox=\"true\" data-recommended=\"false\" class=\"js_recommend\"><\/span><\/figure>\n<p class=\"sc-77igqf-0 bOfvBY\">Ahead of its planned IPO in the U.S., Cellebrite faces fresh flames after its phone-cracking tools were yet again used to violate the privacy of journalists.<\/p>\n<div id class=\"bxm4mm-12 dFBBhS js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic movable-ad\">\n<div class=\"bxm4mm-13 bHHkzv ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 bOfvBY\">The unscrupulous digital forensics firm <span><a class=\"sc-1out364-0 hMndXN sc-145m8ut-0 kVnoAv js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;Internal link&quot;,&quot;https:\/\/gizmodo.com\/new-research-cracks-open-the-murky-world-of-cops-cracki-1845439563&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/gizmodo.com\/new-research-cracks-open-the-murky-world-of-cops-cracki-1845439563\">sells data extraction tools<\/a><\/span> to government authorities throughout the world, helping police crack into suspects phones and analyze their data. <span><a class=\"sc-1out364-0 hMndXN sc-145m8ut-0 kVnoAv js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.accessnow.org\/what-spy-firm-cellebrite-cant-hide-from-investors\/&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.accessnow.org\/what-spy-firm-cellebrite-cant-hide-from-investors\/\" target=\"_blank\" rel=\"noopener noreferrer\">Critics have frequently condemne<!-- -->d<\/a><\/span> the company for its sales to repressive governments<!-- -->\u2014as well as its apparent inability to meaningfully respond to the human rights abuses committed by those clients.<\/p>\n<p class=\"sc-77igqf-0 bOfvBY\">In May, the Committee to Protect Journalists <span><a class=\"sc-1out364-0 hMndXN sc-145m8ut-0 kVnoAv js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;Internal link&quot;,&quot;https:\/\/gizmodo.com\/new-report-shows-phone-cracking-tech-is-being-used-to-t-1846832897&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/gizmodo.com\/new-report-shows-phone-cracking-tech-is-being-used-to-t-1846832897\">published a report<\/a><\/span> revealing the horrendous ordeal of Oratile Dikologang, a Botswana-based reporter who was arrested by police last year on bizarre charges and allegedly tortured. In the course of his arrest, authorities used Cellebrite to unlock Dikologang\u2019s phone and extract information about all of his contacts and sources. <\/p>\n<p class=\"sc-77igqf-0 bOfvBY\">Now CPJ has <span><a class=\"sc-1out364-0 hMndXN sc-145m8ut-0 kVnoAv js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/cpj.org\/2021\/07\/botswana-cellebrite-search-journalists-phone\/&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/cpj.org\/2021\/07\/botswana-cellebrite-search-journalists-phone\/\" target=\"_blank\" rel=\"noopener noreferrer\">uncovered<\/a><\/span> another episode in which Cellebrite\u2019s technology was used to invasively target a journalist: Tsaone Basimanebotlhe, a reporter for the Botswana newspaper <span><a class=\"sc-1out364-0 hMndXN sc-145m8ut-0 kVnoAv js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/twitter.com\/MmegiOnline&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/twitter.com\/MmegiOnline\" target=\"_blank\" rel=\"noopener noreferrer\">Mmegi<\/a><\/span>, says that police came to her village in 2019 and served her with a warrant\u2014not to arrest her, but to seize her devices. <\/p>\n<p class=\"sc-77igqf-0 bOfvBY\">Apparently believing that she had information about a member of Botswana\u2019s national spy agency, the cops deployed Cellebrite\u2019s Universal Forensic Extraction Device (UFED) and Physical Analyzer products, extracting the contents of Basimanebotlhe\u2019s phone including \u201cthousands of her messages, call logs, and emails, and her web browsing history,\u201d according to <span><a class=\"sc-1out364-0 hMndXN sc-145m8ut-0 kVnoAv js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/cpj.org\/2021\/07\/botswana-cellebrite-search-journalists-phone\/&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/cpj.org\/2021\/07\/botswana-cellebrite-search-journalists-phone\/\" target=\"_blank\" rel=\"noopener noreferrer\">CPJ<\/a><\/span>.<\/p>\n<div class=\"bxm4mm-20 dNeZiz\" readability=\"2.3376623376623\">\n<div class=\"sc-1atgi65-0 sc-1atgi65-1 bdNdA-D js_commerce-inset-permalink\" data-inset-url=\"https:\/\/www.amazon.com\/dp\/B0932D45W8?ots=1&amp;ascsubtag=4116e1f123830c926e39fa1314b651ddca0206ca&amp;tag=kinjadeals-20\" data-inset-category=\"CommerceInsetMobile\" readability=\"2.7272727272727\">\n<p>G\/O Media may get a commission<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 bOfvBY\">Yet while they hoovered up her personal information, police apparently found no evidence of what they were originally looking for. <\/p>\n<p class=\"sc-77igqf-0 bOfvBY\">\u201cThey said they didn\u2019t find anything in my phone,\u201d Basimaonebotlhe told CPJ. \u201c[But] they went through my SMS, my WhatsApp [messages],\u201d she said. \u201cThey\u2019re looking for people that are divulging information to the media,\u201d she added.<\/p>\n<div id class=\"bxm4mm-12 dFBBhS js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic movable-ad\">\n<div class=\"bxm4mm-13 bHHkzv ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 bOfvBY\">This story comes at something of an unfortunate moment for Cellebrite. The company <span><a class=\"sc-1out364-0 hMndXN sc-145m8ut-0 kVnoAv js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.reuters.com\/article\/tech-business-surveillance\/israeli-surveillance-firms-nasdaq-plans-challenged-by-digital-rights-groups-idUSL8N2OO5IP&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.reuters.com\/article\/tech-business-surveillance\/israeli-surveillance-firms-nasdaq-plans-challenged-by-digital-rights-groups-idUSL8N2OO5IP\" target=\"_blank\" rel=\"noopener noreferrer\">is set to go public<\/a><\/span> in a $2.4 billion merger with a blank check company, TWC Tech Holdings II Corp\u2014a deal that will put it on the NASDAQ. The IPO has been hampered somewhat, however, by a cadre of 30 human rights groups who are lobbying both investors and U.S. regulators to block the deal until the company cleans up its human rights record.<\/p>\n<p class=\"sc-77igqf-0 bOfvBY\">Those groups recently <span><a class=\"sc-1out364-0 hMndXN sc-145m8ut-0 kVnoAv js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.accessnow.org\/cms\/assets\/uploads\/2021\/07\/CSO_Open-Letter_on_Cellebrite.pdf&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.accessnow.org\/cms\/assets\/uploads\/2021\/07\/CSO_Open-Letter_on_Cellebrite.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">sent an open-letter<\/a><\/span> to U.S. Securities and Exchange Commission, NASDAQ, TWC Tech Holdings II Corp, and other entities attached to the IPO deal, asking that stakeholders abandon the deal until Cellebrite quits its habit of \u201cselling its products to repressive regimes and enabling detentions, prosecutions, and harassment of journalists, civil rights activists, dissidents, and minorities around the world.\u201d <\/p>\n<div id class=\"bxm4mm-12 dFBBhS js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic movable-ad\">\n<div class=\"bxm4mm-13 bHHkzv ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 bOfvBY\">\u201cWe are calling on the parties to halt this deal until Cellebrite demonstrates that it has taken sufficient measures to comply with human rights,\u201d the letter reads, <span><a class=\"sc-1out364-0 hMndXN sc-145m8ut-0 kVnoAv js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.accessnow.org\/cms\/assets\/uploads\/2021\/07\/CSO_Open-Letter_on_Cellebrite.pdf&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.accessnow.org\/cms\/assets\/uploads\/2021\/07\/CSO_Open-Letter_on_Cellebrite.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">further arguing<\/a><\/span> that the company has openly admitted that some of its products \u201cmay be used by customers in a way that is, or that is perceived to be, incompatible with human rights\u201d and that \u201cany such perception could adversely affect [its] reputation, revenue and results of operations.\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32466\/Cellebrite-Under-Fire-Again-After-Being-Used-To-Target-Journalist.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":41754,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8560],"class_list":["post-41753","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentprivacyphonespyware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cellebrite Under Fire Again After Being Used To Target Journalist 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cellebrite-under-fire-again-after-being-used-to-target-journalist\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cellebrite Under Fire Again After Being Used To Target Journalist 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cellebrite-under-fire-again-after-being-used-to-target-journalist\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-14T14:57:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/cellebrite-under-fire-again-after-being-used-to-target-journalist.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cellebrite-under-fire-again-after-being-used-to-target-journalist\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cellebrite-under-fire-again-after-being-used-to-target-journalist\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cellebrite Under Fire Again After Being Used To Target Journalist\",\"datePublished\":\"2021-07-14T14:57:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cellebrite-under-fire-again-after-being-used-to-target-journalist\\\/\"},\"wordCount\":543,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cellebrite-under-fire-again-after-being-used-to-target-journalist\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/cellebrite-under-fire-again-after-being-used-to-target-journalist.gif\",\"keywords\":[\"headline,government,privacy,phone,spyware\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cellebrite-under-fire-again-after-being-used-to-target-journalist\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cellebrite-under-fire-again-after-being-used-to-target-journalist\\\/\",\"name\":\"Cellebrite Under Fire Again After Being Used To Target Journalist 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cellebrite-under-fire-again-after-being-used-to-target-journalist\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cellebrite-under-fire-again-after-being-used-to-target-journalist\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/cellebrite-under-fire-again-after-being-used-to-target-journalist.gif\",\"datePublished\":\"2021-07-14T14:57:31+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cellebrite-under-fire-again-after-being-used-to-target-journalist\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cellebrite-under-fire-again-after-being-used-to-target-journalist\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cellebrite-under-fire-again-after-being-used-to-target-journalist\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/cellebrite-under-fire-again-after-being-used-to-target-journalist.gif\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/cellebrite-under-fire-again-after-being-used-to-target-journalist.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cellebrite-under-fire-again-after-being-used-to-target-journalist\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,privacy,phone,spyware\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentprivacyphonespyware\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cellebrite Under Fire Again After Being Used To Target Journalist\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cellebrite Under Fire Again After Being Used To Target Journalist 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cellebrite-under-fire-again-after-being-used-to-target-journalist\/","og_locale":"en_US","og_type":"article","og_title":"Cellebrite Under Fire Again After Being Used To Target Journalist 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cellebrite-under-fire-again-after-being-used-to-target-journalist\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-07-14T14:57:31+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/cellebrite-under-fire-again-after-being-used-to-target-journalist.gif","type":"image\/gif"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cellebrite-under-fire-again-after-being-used-to-target-journalist\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cellebrite-under-fire-again-after-being-used-to-target-journalist\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cellebrite Under Fire Again After Being Used To Target Journalist","datePublished":"2021-07-14T14:57:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cellebrite-under-fire-again-after-being-used-to-target-journalist\/"},"wordCount":543,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cellebrite-under-fire-again-after-being-used-to-target-journalist\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/cellebrite-under-fire-again-after-being-used-to-target-journalist.gif","keywords":["headline,government,privacy,phone,spyware"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cellebrite-under-fire-again-after-being-used-to-target-journalist\/","url":"https:\/\/www.threatshub.org\/blog\/cellebrite-under-fire-again-after-being-used-to-target-journalist\/","name":"Cellebrite Under Fire Again After Being Used To Target Journalist 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cellebrite-under-fire-again-after-being-used-to-target-journalist\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cellebrite-under-fire-again-after-being-used-to-target-journalist\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/cellebrite-under-fire-again-after-being-used-to-target-journalist.gif","datePublished":"2021-07-14T14:57:31+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cellebrite-under-fire-again-after-being-used-to-target-journalist\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cellebrite-under-fire-again-after-being-used-to-target-journalist\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cellebrite-under-fire-again-after-being-used-to-target-journalist\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/cellebrite-under-fire-again-after-being-used-to-target-journalist.gif","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/cellebrite-under-fire-again-after-being-used-to-target-journalist.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cellebrite-under-fire-again-after-being-used-to-target-journalist\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,privacy,phone,spyware","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentprivacyphonespyware\/"},{"@type":"ListItem","position":3,"name":"Cellebrite Under Fire Again After Being Used To Target Journalist"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=41753"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41753\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/41754"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=41753"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=41753"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=41753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}