News: 0179918858

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Someone Snuck Into a Cellebrite Microsoft Teams Call and Leaked Phone Unlocking Details (404media.co)

(Thursday October 30, 2025 @11:30PM (BeauHD) from the would-you-look-at-that dept.)


An anonymous reader quotes a report from 404 Media:

> Someone recently managed to get on a Microsoft Teams call with representatives from phone hacking company Cellebrite, and then [1]leaked a screenshot of the company's capabilities against many Google Pixel phones, according to a forum post about the leak and 404 Media's review of the material. The leak follows others obtained and verified by 404 Media over the last 18 months. Those leaks [2]impacted both Cellebrite [3]and its competitor Grayshift , now owned by Magnet Forensics. Both companies constantly hunt for techniques to unlock phones law enforcement have physical access to.

>

> "You can Teams meeting with them. They tell everything. Still cannot extract esim on Pixel. Ask anything," a user called rogueFed [4]wrote on the GrapheneOS forum on Wednesday , speaking about what they learned about Cellebrite capabilities. GrapheneOS is a security- and privacy-focused Android-based operating system. rogueFed then posted two screenshots of the Microsoft Teams call. The first was a Cellebrite Support Matrix, which lays out whether the company's tech can, or can't, unlock certain phones and under what conditions. The second screenshot was of a Cellebrite employee. According to another of rogueFed's posts, the meeting took place in October. The meeting appears to have been a sales call. The employee is a "pre sales expert," according to a profile available online.

>

> The Support Matrix is focused on modern Google Pixel devices, including the Pixel 9 series. The screenshot does not include details on the Pixel 10, which is Google's latest device. It discusses Cellebrite's capabilities regarding 'before first unlock', or BFU, when a piece of phone unlocking tech tries to open a device before someone has typed in the phone's passcode for the first time since being turned on. It also shows Cellebrite's capabilities against after first unlock, or AFU, devices. The Support Matrix also shows Cellebrite's capabilities against Pixel devices running GrapheneOS, with some differences between phones running that operating system and stock Android. Cellebrite does support, for example, Pixel 9 devices BFU. Meanwhile the screenshot indicates Cellebrite cannot unlock Pixel 9 devices running GrapheneOS BFU. In their forum post, rogueFed wrote that the "meeting focused specific on GrapheneOS bypass capability." They added "very fresh info more coming."



[1] https://www.404media.co/someone-snuck-into-a-cellebrite-microsoft-teams-call-and-leaked-phone-unlocking-details/

[2] https://yro.slashdot.org/story/24/07/17/1845249/leaked-docs-show-what-phones-cellebrite-can-and-cant-unlock

[3] https://mobile.slashdot.org/story/24/11/30/2359220/leaked-documents-show-what-phones-secretive-tech-graykey-can-unlock

[4] https://discuss.grapheneos.org/d/27698-new-cellebrite-capability-obtained-in-teams-meeting?ref=404media.co



Were they invited by Mike Waltz or Pete Hegseth? (Score:3)

by haruchai ( 17472 )

no need to "sneak in" if you're invited or added

Professional unethical for-profit hackers hacked (Score:2)

by Rosco P. Coltrane ( 209368 )

Poetic justice.

Don't bother clicking on the link (Score:2)

by 93 Escort Wagon ( 326346 )

It's for "paid subscribers" only, like all of the 404 Media stuff that gets spammed here.

Any time things appear to be going better, you have overlooked something.