Friday, June 6, 2025
HomeAmnesty InternationalSerbian students Android phone compromised by exploit from Cellebrite

Serbian students Android phone compromised by exploit from Cellebrite

Share

Amnesty International on Friday said it determined that a zero-day exploit sold by controversial exploit vendor Cellebrite was used to compromise the phone of a Serbian student who had been critical of that country’s government.

The human rights organization first called out Serbian authorities in December for what it said was its “pervasive and routine use of spyware” as part of a campaign of “wider state control and repression directed against civil society.” That report said the authorities were deploying exploits sold by Cellebrite and NSO, a separate exploit seller whose practices have also been sharply criticized over the past decade. In response to the December report, Cellebrite said it had suspended sales to “relevant customers” in Serbia.

Campaign of surveillance

On Friday, Amnesty International said that it uncovered evidence of a new incident. It involves the sale by Cellebrite of an attack chain that could defeat the lock screen of fully patched Android devices. The exploits were used against a Serbian student who had been critical of Serbian officials. The chain exploited a series of vulnerabilities in device drivers the Linux kernel uses to support USB hardware.

“This new case provides further evidence that the authorities in Serbia have continued their campaign of surveillance of civil society in the aftermath of our report, despite widespread calls for reform, from both inside Serbia and beyond, as well as an investigation into the misuse of its product, announced by Cellebrite,” authors of the report wrote.

Amnesty International first discovered evidence of the attack chain last year while investigating a separate incident outside of Serbia involving the same Android lockscreen bypass. Authors of Friday’s report wrote:

The exploit, which targeted Linux kernel USB drivers, enabled Cellebrite customers with physical access to a locked Android device to bypass an Android phone’s lock screen and gain privileged access on the device. As the exploit targets core Linux kernel USB drivers, the impact is not limited to a particular device or vendor and could affect a very wide range of devices. The same vulnerabilities could also expose Linux computers and Linux-powered embedded devices to physical attacks, although there is no evidence of this exploit chain has been designed to target non-Android Linux devices.

The report said that one of the vulnerabilities, tracked as CVE-2024-53104, was patched earlier this month with the release of the February 2025 Android Security Bulletin. Two other vulnerabilities—CVE-2024-53197 and CVE-2024-50302—have been patched upstream in the Linux kernel but have not yet been incorporated into Android.

Forensic traces identified in Amnesty International’s analysis of the compromised phone showed that the Serbian authorities tried to install an unknown application after the device had been unlocked. The report authors said the installation of apps on Cellebrite-compromised devices was consistent with earlier cases the group has uncovered in which spyware tracked as NoviSpy spyware were installed.

As part of the attack, the USB port of the targeted phone was connected to various peripherals during the initial stages. In later stages, the peripherals repeatedly connected to the phone so they could “disclose kernel memory and groom kernel memory as part of the exploitation.” The people analyzing the phone said the peripherals were likely special-purpose devices that emulated video or sound devices connecting to the targeted device.

The 23-year-old student who owned the phone regularly participates in the ongoing student protests in Belgrade. Any Android users who have yet to install the February patch batch should do so as soon as possible.

Popular

Teslas board reportedly sought a successor while Musk wheeled around Washington

According to a new, brow-raising WSJ report, Tesla’s board quietly began searching for Elon Musk’s potential successor about a month ago, approaching executive...

Elon Musk and Donald Trump are smack talking each other into their own digital echo chambers

Well, it finally happened. This town wasn’t big enough for the two towering egos of billionaire Elon Musk and President Donald Trump, and...

Related Articles

Cursors Anysphere nabs $9.9B valuation, soars past $500M ARR

Anysphere, the maker of AI coding assistant Cursor, has raised $900 million at...

Elon Musk and Donald Trump are smack talking each other into their own digital echo chambers

Well, it finally happened. This town wasn’t big enough for the two towering...

Revival of UVB-76: Cold War Ghosts in Modern Warfare

There’s something eerie about hearing a sound that once haunted the Cold...

How to watch Apples WWDC 2025 keynote

Apple is hosting its 2025 Worldwide Developers Conference starting Monday, with the keynote...

Profitable African fintech PalmPay is in talks to raise as much as $100M

PalmPay, an African digital bank fintech, is in talks to raise between $50...

North America takes the bulk of AI VC investments, despite tough political environment

Despite what some experts have characterized as an environment increasingly hostile to AI...

iOS 19: All the rumored changes Apple could be bringing to its new operating system

As Apple prepares to unveil iOS 19 at WWDC 2025 on Monday, several...

Attacks on the Three Facets of My Identity

Avi Loeb is the head of the Galileo Project, founding director of Harvard University’s — Black...