Zero-Day Drama: Cellebrite’s Exploit Unleashes Chaos on Android Devices

A Serbian activist’s Android phone fell victim to a zero-day exploit by Cellebrite, targeting USB drivers. The vulnerability, CVE-2024-53104, was patched in the Linux kernel but not yet in Android. Amnesty International revealed authorities attempted to install unknown software, hinting at potential NoviSpy spyware attacks.

Pro Dashboard

Hot Take:

In a plot twist that no one asked for, it turns out that Android phones are more like onions than you thought: layers of security peeled away by the mighty hands of Cellebrite’s zero-day exploit! Who knew “peeling an onion” involved USB drivers?

Key Points:

  • A Serbian youth activist’s Android device was hacked using a zero-day exploit developed by Cellebrite.
  • The exploit targeted CVE-2024-53104, a privilege escalation vulnerability in the Android USB driver.
  • The exploit used two additional flaws, CVE-2024-53197 and CVE-2024-50302, not yet patched in Android.
  • The activist’s phone was confiscated during a protest, and an unknown app was installed.
  • Cellebrite halts use of its tools in Serbia following the incident.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?