UFED Physical Analyzer, UFED Logical Analyzer and Cellebrite Reader V7.26 November 2019

Total Page:16

File Type:pdf, Size:1020Kb

UFED Physical Analyzer, UFED Logical Analyzer and Cellebrite Reader V7.26 November 2019 RELEASE NOTES UFED Physical Analyzer, UFED Logical Analyzer and Cellebrite Reader v7.26 November 2019 App versions: 9,874 Solved Issues – UFED Physical Analyzer • Improved loading time for iOS extractions. • Improved performance and stabilization of the Virtual Analyzer with offline machines or closed network machines. • The offline maps in the right pane operate as expected. • Application is now fully responding in views when there are many items (like in chat) in model. UFED Physical Analyzer can now handle thousands of items in a very short time. • Improved performance of WeChat parser for iOS devices. • Decoding of Viber app for iOS device is now running successfully. • Decoding of Threema app version 6.36 has been fixed. • Source file information for iOS application usage log is now included in PDF reports. UFED Physical Analyzer, UFED Logical Analyzer and Cellebrite Reader v7.26 | November 2019 | www.cellebrite.com iOS: New and updated apps 26 updated apps Azar 1.38.3 Booking.com 20.8 Dropbox 162.2 Facebook 243.0 Facebook Messenger 238 Firefox 19.0 Fitbit 3.6.1 Garmin Connect 4.23 Gmail 6.0.190822 Google Translate 6.2.0 Hangouts 26.0.267030673 HERE Maps 2.0.47 Keeper 14.7.0 LINE 9.16.6 Mail.Ru 10.3.1 MeetMe 14.4.0 Skype 8.53.102 Snapchat 10.68.5 Tango 6.12.238092 Telegram Messenger 5.12 textPlus 7.6.2 Twitter 8.0 Viber 11.7.0 Vkontakte 5.26.2 WhatsApp 2.19.92 WhatsApp_Business 2.19.92 UFED Physical Analyzer, UFED Logical Analyzer and Cellebrite Reader v7.26| November 2019 | www.cellebrite.com 2 Android: New and updated apps 64 updated apps Any.DO 4.15.7.14 ASKfm 4.49.2 Azar 3.43.3-arm64 Booking.com 19.2 Chrome 77.0.3865.92 Coco 7.6.8 DJI GO 4 4.3.24 Dropbox 158.2.2 Facebook 239.0.0.41.152 Facebook Messenger 233.0.0.16.158 Firefox 68.1.1 Fitbit 3.5 Flipboard 4.2.22 GG 4.15.1.20396 Glide Glide.v10.359.200 Gmail 2019.09.01.268168002.release Google Calendar 6.0.50.265670076-release Google Docs 1.19.352.06.45 Google Drive 2.19.352.03.45 Google Maps 10.25.2 Google Photos 4.24.1.268564418 Google Translate 6.2.0.RC07.268294262 Grindr 5.17.2 GroupMe 5.39.9 imo 2019.4.11 Kakao Story 5.12.1 KakaoTalk 8.5.6 KeepSafe 9.43.0 Life360 19.4.0 LINE 9.16.1 LinkedIn 4.1.353 Mail.Ru 10.6.0.27640 My Tracks 4.3.3 Odnoklassniki 19.9.10 Opera Mini 44.1.2254.142553 Opera Mobile 53.1.2569.142848 Pinterest 7.32.0 Pokemon GO 0.153.1 UFED Physical Analyzer, UFED Logical Analyzer and Cellebrite Reader v7.26| November 2019 | www.cellebrite.com 3 Runtastic 9.10 SayHi 7.47 Skout 6.12.1 Skype 8.52.0.142 Swarm 6.4 Tango 6.11.237500 Telegram Messenger 5.11.0 Text Now 6.42.1.0 TigerText 8.6.1.688 TikTok 13.0.4 Tinder 10.23.2 Truecaller 10.47.9 Tumblr 14.2.0.00 Twitter 8.13.0-release.00 Uber 4.279.10002 UC Browser 12.13.01207 Viber 11.5.0.6 Vkontakte 5.44 Voxer 3.18.19.21166 Waze 4.54.1.1 Weibo 9.9.1 WhatsApp 2.19.258 WhatsApp_Business 2.19.90 Yandex Browser 19.7.6.137 Zalo 19.08.01.r1 Zello 4.70 Cryptographic hash values information You can validate the integrity of Cellebrite's UFED software files by verifying their cryptographic hash values. This can help you identify whether a file has been changed from its original state. Product MD5 SHA-256 (Recommended) UFED Physical Analyzer 89002ace225dbbfc3e776d617497ec85 5c4af2a4819a39f3808846ed2f071874fcbc886e9afbfbba43130f047b1a1357 UFED Logical Analyzer 13fc03e549002c4822c4cd13e180b26a ae5c9e07728251dbe17dde4e9ff8272744161bad5c1e66d0f5edf805e6844ca7 Cellebrite Reader 37384c9067b2140ae67a6612671fba76 983112a739342595cfcba7cc8b369259c88d6df2a9e9e7c444dd9d7f5a8aeca8 UFED Physical Analyzer, UFED Logical Analyzer and Cellebrite Reader v7.26| November 2019 | www.cellebrite.com 4.
Recommended publications
  • Deploy Your Chatbots Everywhere Bots Are Taking Over!
    Deploy your Chatbots Everywhere Bots are taking over! By 2021, more than 50% enterprises will spend more on chatbots than traditional mobile apps Source: Gartner Top Strategic Predictions for 2018 and Beyond Every major messaging platform supports Conversational Apps and Chatbots already ➀ Build Once, Deploy to all Messaging Platforms with a Single API Businesses building conversational interfaces typically want to deploy over multiple messaging channels. B2C apps need Consumer Messengers. B2B apps need Enterprise (Team) Messengers. Integrating with each messaging Client System platform is highly resource consuming - Conversational Interface Business Autochat Omni-channel API due to different APIs and capabilities. Logic - Internal API Integrations Autochat provides one-click integrations with most popular messengers. Messages are also auto-translated to match capability of the end messenger. Consumer Messengers Business Messengers FB Messenger, Telegram, Slack, Microsoft Teams, Viber, WeChat, iMessage, Flock, Cisco Spark, Stride, Whatsapp, etc. etc. ➁ Full-featured, Native Messaging SDKs for Web, Android & iOS Many businesses like to enable conversational interfaces within their web and mobile apps as well. This requires building a custom messenger inside their apps. They also need to provide a user experience at par with leading messengers like Facebook Messenger and Slack. Users Client System expect rich messaging features like - Conversational Interface Business Autochat Omni-channel API typing indicators, images, buttons, Logic quick replies, webviews. - Internal API Integrations Autochat provides full featured real time messaging SDKs that can be integrated in no time. Consumer Messengers Business Messengers Native Messaging SDKs FB Messenger, Telegram, Slack, Microsoft Teams, - Web, Android, iOS Viber, WeChat, iMessage, - Feature rich Flock, Cisco Spark, Whatsapp, etc.
    [Show full text]
  • An Empirical Survey on How Much Security and Privacy Customers Want in Instant Messengers
    SECURWARE 2016 : The Tenth International Conference on Emerging Security Information, Systems and Technologies An Empirical Survey on how Much Security and Privacy Customers Want in Instant Messengers Thomas Paul Hans-Joachim Hof MuSe – Munich IT Security Research Group Munich University of Applied Sciences Munich University of Applied Sciences Lothstrasse 64, Munich, Germany Lothstraße 64, Munich, Germany e-mail: [email protected] e-mail: [email protected] Abstract— Instant messengers are popular communication developers of future instant messengers to decide on tools used by many people for everyday communication, as security features to implement. well as for work related communication. Following the This paper is structured as follows: Section II discusses disclosure of a massive surveillance system by Edward related work. Section III presents the design of the user Snowden, many users became aware of the risks of unsecure survey. Section IV discusses in detail the findings of the communication. Users increasingly ask for secure communication. However, unsecure instant messengers are still user survey. Section V presents the features of an ideal popular nowadays. This could be due to the fact, that, besides instant messenger fulfilling all the user preferences the large number of available instant messengers, no instant identified by the survey. A market simulation is used to messenger fully satisfies the users preferences. To research the show the potential of this ideal instant messenger. Section acceptance of security mechanisms in instant messengers, this VI summarizes the findings of the paper. paper presents an evaluation of user preferences for secure instant messengers. A user survey was conducted to rate the II.
    [Show full text]
  • Investigating Mobile Messaging Security
    Technische Universitat¨ Munchen¨ Department of Informatics Interdisciplinary Project in Electrical Engineering Investigating Mobile Messaging Security Elias Hazboun Technische Universitat¨ Munchen¨ Department of Informatics Interdisciplinary Project in Electrical Engineering Investigating Mobile Messaging Security Untersuchung von Mobile Messaging Sicherheit Author Elias Hazboun Supervisor Prof. Dr.-Ing. Georg Carle Advisor Dr. Matthias Wachs, Quirin Scheitle Date April 27, 2016 Informatik VIII Chair for Network Architectures and Services Abstract In this report we document our work in analyzing the security of a selection of mobile messaging apps. Focusing on network based security, we studied traffic generated by the apps to gain an understanding of the current state of applying encryption and authentication protocols. Our findings show a positive trend in security with developers steadily improving security with newer app updates partly due to the increased scrutiny from the community and academia. Although not all apps analyzed had perfect state of the art security properties, none have shown any major vulnerabilities exploited by normal adversaries. It was also evident that only one app - namely TextSecure - is using the industry standard TLS for server-client authentication and security while others have opted for custom made protocols and algorithms. I Contents 1 Introduction 1 1.1 Research Question . .2 1.2 Outline . .2 2 Background and Related Work 3 2.1 Methodology . .3 2.1.1 App Selection . .3 2.1.2 Approach . .3 2.2 Definition of Security Concepts . .4 2.2.1 Layers of Encryption . .4 2.2.2 Transport Layer Security Protocol (TLS) . .5 2.2.3 Perfect Forward Secrecy (PFS) . .5 2.2.4 Asynchronous Messaging Security .
    [Show full text]
  • Enterprise Edition
    Secure Communication. Simplified. SAFECHATS Problem Most companies use popular insecure email and ⛔ messaging services to communicate confidential information P The information flow within the Company is ⛔ disorganized Metadata is exposed and available to third-party ⛔ services SAFECHATS Introducing SAFECHATS Ultra-secure communication solution P Designed with security in mind SAFECHATS Why SAFECHATS? ✔ Information is always end-to-end encrypted by default P ✔ All-in-one communication suite: • Text messaging (one-on-one and group chats) • Voice calls • File transfers (no size and file type limits) SAFECHATS How does SAFECHATS solve the problem? ✔ Customizable white label solution ✔ Integrates with existing softwareP infrastructure ✔ Enterprise-wide account and contact list management, supervised audited chats for compliance SAFECHATS What makes SAFECHATS different? ✔ Your own isolated cloud environment or on-premise deployment P ✔ Customizable solution allows to be compliant with internal corporate security policies ✔ No access to your phone number and contact list SAFECHATS Screenshot Protection ✔ Notifications on iOS P ✔ DRM protection on Android SAFECHATS Identity Verification ✔ Protection from man-in-the-middle attacksP ✔ SMP Protocol SAFECHATS Privacy Features ✔ Show / hide messages and files P ✔ Recall messages and files ✔ Self-destructing messages and files SAFECHATS Additional Protection ✔ History retention control P ✔ Application lock: • PIN-code • Pattern-lock on Android devices • Touch ID on iOS devices SAFECHATS How does SAFECHATS
    [Show full text]
  • Whatsapp Acceptance: a Comparison Between Individualistic and Collectivistic Cultures
    IBIMA Publishing Journal of Internet Social Networking & Virtual Communities https://ibimapublishing.com/articles/JISNVC/2020/914643/ Vol. 2020 (2020), Article ID 914643, 10 pages, ISSEN: 2166-0794 DOI: 10.5171/2020.914643 Research Article WhatsApp Acceptance: A Comparison Between Individualistic and Collectivistic Cultures Serri FAISAL and Ghassan AL-QAIMARI Emirates College of Technology. UAE Correspondence should be addressed to: Serri FAISAL; [email protected] Received date: 20 November 2019; Accepted date: 7 May 2020; published date: 16 June 2020 Copyright © 2020. Serri FAISAL and Ghassan AL-QAIMARI. Distributed under Creative Commons Attribution 4.0 International CC-BY 4.0 Abstract Social media applications led by WhatsApp have exhibited a great adoption rate in individualistic and collectivistic societies. To study the factors which influence the adoption of software applications across cultures, the application design was studied by researchers in both individualistic and collectivistic societies. Most of such studies concentrated on the application design from the developer's point of view. Differently, this research study empirically explores the factors that influence the adoption of smartphone apps, such as WhatsApp, from the user's perspective. Therefore, the focus in this paper is on the moderating effect of Hofstede’s cross- cultures dimension, individualism vs. collectivism (IDV), and the interconnection between the persuasive system design (PSD) and acceptance. A total of 488 responses were collected from societies which span on the spectrum of IDV to include two individualistic societies, Netherlands and Germany, and two collectivistic societies, Malaysia and the Kingdom of Saudi Arabia. The overall results indicate that persuasive design principles are relevant to cultures across the globe.
    [Show full text]
  • Cryptography Whitepaper
    Cryptography Whitepaper Threema uses modern cryptography based on open source components that strike an optimal balance between security, performance and message size. In this whitepaper, the algorithms and design decisions behind the cryptography in Threema are explained. VERSION: JUNE 21, 2021 Contents Overview 4 Open Source 5 End-to-End Encryption 5 Key Generation and Registration 5 Key Distribution and Trust 6 Message Encryption 7 Group Messaging 8 Key Backup 8 Client-Server Protocol Description 10 Chat Protocol (Message Transport Layer) 10 Directory Access Protocol 11 Media Access Protocol 11 Cryptography Details 12 Key Lengths 12 Random Number Generation 13 Forward Secrecy 14 Padding 14 Repudiability 15 Replay Prevention 15 Local Data Encryption 15 iOS 15 Android 16 Key Storage 16 iOS 16 Android 16 Push Notifications 17 iOS 17 Android 17 Threema • Cryptography Whitepaper Address Book Synchronization 17 Linking 18 ID Revocation 19 An Example 19 Profile Pictures 19 Web Client 20 Architecture 20 Connection Buildup 21 WebRTC Signaling 22 WebRTC Connection Buildup 22 Trusted Keys / Stored Sessions 23 Push Service 23 Self Hosting 24 Links 24 Threema Calls 24 Signaling 24 Call Encryption 24 Audio Encoding 25 Video Encoding 25 Privacy / IP Exposure 25 Threema Safe 26 Overview 26 Backup Format 27 Encryption 27 Upload/Storage 27 Backup Intervals 28 Restore/Decryption 28 Running a Custom Threema Safe Server 28 Threema • Cryptography Whitepaper Overview Threema uses two different encryption layers to protect messages between the sender and the recipient. • End-to-end encryption layer: this layer is between the sender and the recipient. • Transport layer: each end-to-end encrypted message is encrypted again for transport between the client and the server, in order to protect the header information.
    [Show full text]
  • Yahoo Messenger Error Code 7 Softpedia
    Yahoo Messenger Error Code 7 Softpedia Available now for Linux, Mac OS X, and Microsoft Windows. Mozilla Thunderbird 38.0 Arrives with GMail OAuth2 and Yahoo Messenger Support. DESKTOP Windows Messenger, Google Talk, ICQ, Skype), but it can also directly access social with red highlights), or change font to code style (which is especially useful if you're trying There are tons of emoticons you can play with (smiley faces, objects and symbols), and some of them are compatible with Yahoo! Clear Yahoo Messenger cache in Windows. Caution: These steps apply to 32-bit and 64-bit versions of Windows XP, Windows Vista, Windows 7, and Windows. ManyCam also allows you to broadcast four video windows simultaneously or picture in picture video. wont finish downloading, gets stuck everytime and Im on an i7 the exe file runs (and I assume pulls more code down from web) Norton says Trojan. Operating Systems, Windows XP/Vista/7/8 Yahoo Messenger. Yahoo! Messenger can be run on various versions of the Windows operating Download Skype 7.1 Offline Installer Latest Version 2015 Download Skype. -Softpedia.com can add not only keystrokes and mouse actions to your scripts but also manage windows, Facebook, Yahoo, AOL, Hotmail So im using this for a game and it works great but theres one issue it doesnt June 19 at 7:32am. Yahoo Messenger Error Code 7 Softpedia >>>CLICK HERE<<< Telegram Desktop is a powerful, cross-platform messenger app that enables iOS (known as Telegram Messenger) and Windows Phone, but also desktop a valid mobile phone number, which is used for generating a security code.
    [Show full text]
  • Guess Who's Texting You? Evaluating the Security of Smartphone
    Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications Sebastian Schrittwieser, Peter Fruhwirt,¨ Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar Weippl SBA Research gGmbH Vienna, Austria (1stletterfirstname)(lastname)@sba-research.org Abstract been the subject of an ample amount of past research. The common advantages of the tools we examined lie in In recent months a new generation of mobile messag- very simple and fast setup routines combined with the possi- ing and VoIP applications for smartphones was introduced. bility to incorporate existing on-device address books. Ad- These services offer free calls and text messages to other ditionally these services offer communication free of charge subscribers, providing an Internet-based alternative to the and thus pose a low entry barrier to potential customers. traditional communication methods managed by cellular However, we find that the very design of most of these mes- network carriers such as SMS, MMS and voice calls. While saging systems thwarts their security measures, leading to user numbers are estimated in the millions, very little atten- issues such as the possibility for communication without tion has so far been paid to the security measures (or lack proper sender authentication. thereof) implemented by these providers. The main contribution of our paper is an evaluation of the In this paper we analyze nine popular mobile messaging security of mobile messaging applications with the afore- and VoIP applications and evaluate their security models mentioned properties and the possibilities of abuse in real- with a focus on authentication mechanisms. We find that a world scenarios.
    [Show full text]
  • How Secure Is Textsecure?
    How Secure is TextSecure? Tilman Frosch∗y, Christian Mainkay, Christoph Badery, Florian Bergsmay,Jorg¨ Schwenky, Thorsten Holzy ∗G DATA Advanced Analytics GmbH firstname.lastname @gdata.de f g yHorst Gortz¨ Institute for IT-Security Ruhr University Bochum firstname.lastname @rub.de f g Abstract—Instant Messaging has gained popularity by users without providing any kind of authentication. Today, many for both private and business communication as low-cost clients implement only client-to-server encryption via TLS, short message replacement on mobile devices. However, until although security mechanisms like Off the Record (OTR) recently, most mobile messaging apps did not protect confi- communication [3] or SCIMP [4] providing end-to-end con- dentiality or integrity of the messages. fidentiality and integrity are available. Press releases about mass surveillance performed by intelli- With the advent of smartphones, low-cost short-message gence services such as NSA and GCHQ motivated many people alternatives that use the data channel to communicate, to use alternative messaging solutions to preserve the security gained popularity. However, in the context of mobile ap- and privacy of their communication on the Internet. Initially plications, the assumption of classical instant messaging, fueled by Facebook’s acquisition of the hugely popular mobile for instance, that both parties are online at the time the messaging app WHATSAPP, alternatives claiming to provide conversation takes place, is no longer necessarily valid. secure communication experienced a significant increase of new Instead, the mobile context requires solutions that allow for users. asynchronous communication, where a party may be offline A messaging app that claims to provide secure instant for a prolonged time.
    [Show full text]
  • The Best Just Got Better!
    NOVEMBER, 2012 The Best Just Got Better! Project Analytics Release Highlights Establish better investigation leads by viewing statistics on communications and identifying relationship strengths via volume of events, as well as regular and irregular New Decoding patterns. Statistics are generated by data types such as chats, calls, SMS and emails, from file system and physical extractions. Exclusive – BlackBerry® Results are presented in a graph and table view. messenger (groups, attachments and deleted data) Quickly identify: • Whom the device owner communicates with the most Exclusive – Nokia BB5 – File system reconstruction and • Preferred communication channels decoding of selected data • Communication directions - incoming and outgoing calls, SMS, MMS, emails, View Android application les chat messages etc. New apps on iPhone, Android and BlackBerry Enhanced data types from phones with Chinese chipsets and more… UFED Physical / Logical Analyzer Features: Improved TomTom trip-log decryption process* Industry First! Mobile Malware Detection Timeline graph Malware detection allows UFED Physical Analyzer users to perform on-demand Export locations to KML les searches for viruses, spyware, Trojans and other malicious payloads in files extracted Export emails to EML les using physical or file system methods – applicable to ALL smartphones. Embedded text viewer There's more: • Ongoing malware signature updates Advanced lter improvements • UFED Physical Analyzer 3.5 is now integrated with award-winning security software – BitDefender *Available within UFED Physical Analyzer only • Once infected files have been identified, a detailed list containing malware data, file name, path, size and other information is presented Vast Performance Improvements Coping with the ever growing amount of data available in smartphones, Cellebrite has re-designed the UFED Physical Analyzer engine for much faster decoding, scrolling, sorting and searching among huge amounts of data – pictures, files etc.
    [Show full text]
  • Listener Feedback #170
    Security Now! Transcript of Episode #409 Page 1 of 40 Transcript of Episode #409 Listener Feedback #170 Description: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. They tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-409.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-409-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. What a great show ahead. Questions, answers. We'll talk more about PRISM, more insight there. You've got to stay tuned. This is the show to keep your privacy and security up. Security Now! is next. Leo Laporte: This is Security Now! with Steve Gibson, Episode 409, recorded June 19th, 2013: Your questions, Steve's answers, #170. It's time for Security Now!, the post-NSA edition. Steve Gibson is here, our Explainer in Chief, the guy who does all the security and privacy and is really our guru in that realm. Hello, Steve. Good to see you. Steve Gibson: Hey, Leo. Great to be with you again. And we have largely, as expected, a follow-up to last week's blockbuster theory of how PRISM works, as I expected. Actually I probably had double the number of email that I normally pull from the mailbag, which would have only been in half of the period of time.
    [Show full text]
  • Wireless Evolution •..••••.•.•...•....•.•..•.•••••••...••••••.•••.••••••.••.•.••.••••••• 4
    Department of Justice ,"'''''''''<11 Bureau of Investigation ,Operational Technology Division WIRELESS EVDLUTIDN IN THIS Iselil-it:: .. WIRELESS EVOLUTIDN I!I TECH BYTES • LONG TERM EVOLUTIQN ill CLDUD SERVICES • 4G TECHNOLOGY ill GESTURE-RECOGNITION • FCC ON BROADBAND • ACTIVITY-BASED NAVIGATION 'aw PUIi! I' -. q f. 8tH'-.1 Waa 8RI,. (!.EIi/RiW81 R.d-nl)) - 11 - I! .el " Ij MESSAGE FROM MANAGEMENT b7E he bou~~aries of technology are constantly expanding. develop technical tools to combat threats along the Southwest Recognizing the pathway of emerging technology is Border. a key element to maintaining relevance in a rapidly changing technological environment. While this The customer-centric approach calls for a high degree of T collaboration among engineers, subject matter experts (SMEs), proficiency is fundamentally important in developing strategies that preserve long-term capabilities in the face of emerging and the investigator to determine needs and requirements. technologies, equally important is delivering technical solutions To encourage innovation, the technologists gain a better to meet the operational needs of the law enforcement understanding of the operational and investigative needs customer in a dynamic 'threat' environment. How can technical and tailor the technology to fit the end user's challenges. law enforcement organizations maintain the steady-state Rather than developing solutions from scratch, the customer­ production of tools and expertise for technical collection, while centric approach leverages and modifies the technoloe:v to infusing ideas and agility into our organizations to improve our fit the customer's nFlFlrt~.1 ability to deliver timely, relevant, and cutting edge tools to law enforcement customers? Balancing these two fundamentals through an effective business strategy is both a challenge and an opportunity for the Federal Bureau of Investigation (FBI) and other Federal, state, and local law enforcement agencies.
    [Show full text]