By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody
Computing

Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody

News Room
Last updated: 2026/02/18 at 2:05 PM
News Room Published 18 February 2026
Share
Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody
SHARE

Ravie LakshmananFeb 18, 2026Mobile Security / Spyware

New research from the Citizen Lab has found signs that Kenyan authorities used a commercial forensic extraction tool manufactured by Israeli company Cellebrite to break into a prominent dissident’s phone, making it the latest case of abuse of the technology targeting civil society.

The interdisciplinary research unit at the University of Toronto’s Munk School of Global Affairs & Public Policy said it found the indicators on a personal phone belonging to Boniface Mwangi, a Kenyan pro-democracy activist who has announced plans to run for president in 2027.

Specifically, it has emerged that Cellebrite’s forensic extraction tools were used on his Samsung phone while it was in police custody following his arrest in July 2025.

The phone was returned to him nearly two months later, in September, at which point Mwangi found that the phone was no longer password-protected and could be unlocked without requiring a password. It’s been assessed with high confidence that Cellebrite’s technology was used on the phone on or around July 20 and July 21, 2025.

“The use of Cellebrite could have enabled the full extraction of all materials from Mwangi’s device, including messages, private materials, personal files, financial information, passwords, and other sensitive information,” the Citizen Lab said.

The latest findings follow a separate report released last month, in which the researchers said officials in Jordan likely used Cellebrite to extract information from the mobile phones of activists and human rights defenders who had been critical of Israel and spoke out in support of Palestinians in Gaza.

The devices were seized by Jordanian authorities during detentions, arrests, and interrogations, and subsequently returned to them. The documented incidents took place between late 2023 and mid-2025, the Citizen Lab said.

In response to the findings, a spokesperson for Cellebrite told The Guardian that the company’s technology is used to “access private data only in accordance with legal due process or with appropriate consent to aid investigations legally after an event has occurred.”

The two cases add to a growing body of evidence documenting the misuse of Cellebrite technology by government clients. It also reflects a broader ecosystem of surveillance abuses by various governments around the world to enable highly-targeted surveillance using mercenary spyware like Pegasus and Predator.

Predator Spyware Targets Angolan Journalist

The development also coincides with another report from Amnesty International, which discovered evidence that the iPhone belonging to Teixeira Cândido, an Angolan journalist and press freedom advocate, was successfully targeted by Intellexa’s Predator spyware in May 2024 after he opened an infection link received via WhatsApp.

The iPhone was running iOS 16.2, an outdated version of the operating system with known security issues. It’s currently not known what exploit was used to trigger the infection. In multiple reports published last year, Recorded Future revealed that it has observed suspected Predator operations in Angola dating back to 2024.

“This is the first forensically confirmed case of the Predator spyware being used to target civil society in Angola,” the international human rights organization said. “Once the spyware was installed, the attacker could gain unrestricted access to Teixeira Cândido’s iPhone.”

“The Predator spyware infection appears to have lasted less than one day, with the infection being removed when Teixeira Cândido’s phone was restarted in the evening of 4 May 2024. From that time until 16 June 2024, the attackers made 11 new attempts to re-infect the device by sending him new malicious Predator infection links. All of these subsequent attack attempts appear to have failed, likely due to the links simply not being opened.”

According to an analysis published by French offensive security company Reverse Society, Predator is a commercial spyware product “built for reliable, long-term deployment” and allows operators to selectively enable or disable modules based on target activity, granting them real-time control over surveillance efforts.

Predator has also been found to incorporate various undocumented anti-analysis mechanisms, including a crash reporter monitoring system for anti-forensics and SpringBoard hooking to suppress recording indicators from victims when the microphone or camera is activated, illustrating the sophistication of the spyware. On top of that, it has explicit checks to avoid running in U.S. and Israeli locales.

“These findings demonstrate that Predator’s operators have granular visibility into failed deployments, […] enabling them to adapt their approaches for specific targets,” Jamf Threat Labs researchers Shen Yuan and Nir Avraham said. “This error code system transforms failed deployments from black boxes into diagnostic events.” 

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Google Pixel 10a vs Pixel 8a: Is it time to upgrade? Google Pixel 10a vs Pixel 8a: Is it time to upgrade?
Next Article OpenAI must stop using ‘Cameo’ term, judge rules OpenAI must stop using ‘Cameo’ term, judge rules
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

KBIS 2026: Live Updates From Day 2 at the Kitchen and Bath Industry Show
KBIS 2026: Live Updates From Day 2 at the Kitchen and Bath Industry Show
News
The HackerNoon Newsletter: The Huel-ification of Thinking (2/18/2026) | HackerNoon
The HackerNoon Newsletter: The Huel-ification of Thinking (2/18/2026) | HackerNoon
Computing
Amazon Fire TV update lands in US to end tedium of scrolling to find a film | Stuff
Amazon Fire TV update lands in US to end tedium of scrolling to find a film | Stuff
Gadget
Considering a PS5 Pro? I’ve Had It for a Year and Don’t Think It’s Worth 9
Considering a PS5 Pro? I’ve Had It for a Year and Don’t Think It’s Worth $749
News

You Might also Like

The HackerNoon Newsletter: The Huel-ification of Thinking (2/18/2026) | HackerNoon
Computing

The HackerNoon Newsletter: The Huel-ification of Thinking (2/18/2026) | HackerNoon

2 Min Read
Tech Moves: Sana hires CFO; Aptevo names new CEO; Violett founder departs; and more
Computing

Tech Moves: Sana hires CFO; Aptevo names new CEO; Violett founder departs; and more

3 Min Read
Linux 7.0 Retires The IBM Mwave ACP Modem Driver Used By Some 1990s ThinkPads
Computing

Linux 7.0 Retires The IBM Mwave ACP Modem Driver Used By Some 1990s ThinkPads

1 Min Read
China reports surge in token consumption as AI applications expand · TechNode
Computing

China reports surge in token consumption as AI applications expand · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?