Get the latest tech news

Serbian student’s Android phone compromised by exploit from Cellebrite


Android users who haven’t installed Google’s February patch batch should do so ASAP.

Amnesty International first discovered evidence of the attack chain last year while investigating a separate incident outside of Serbia involving the same Android lockscreen bypass. Forensic traces identified in Amnesty International’s analysis of the compromised phone showed that the Serbian authorities tried to install an unknown application after the device had been unlocked. Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords.

Get the Android app

Or read this on ArsTechnica

Read more on:

Photo of Android

Android

Photo of Exploit

Exploit

Photo of Android Phone

Android Phone

Related news:

News photo

Researchers uncover unknown Android flaws used to hack into a student’s phone

News photo

Serbian police used Cellebrite zero-day hack to unlock Android phones

News photo

Android 16 Beta 2.1 is here to fix a set of annoying bugs