New analysis from the Citizen Lab has discovered indicators that Kenyan authorities used a industrial forensic extraction software manufactured by Israeli firm Cellebrite to interrupt right into a distinguished dissident’s cellphone, making it the most recent case of abuse of the expertise focusing on civil society.
The interdisciplinary analysis unit on the College of Toronto’s Munk Faculty of World Affairs & Public Coverage stated it discovered the symptoms on a private cellphone belonging to Boniface Mwangi, a Kenyan pro-democracy activist who has introduced plans to run for president in 2027.
Particularly, it has emerged that Cellebrite’s forensic extraction instruments had been used on his Samsung cellphone whereas it was in police custody following his arrest in July 2025.
The cellphone was returned to him almost two months later, in September, at which level Mwangi discovered that the cellphone was now not password-protected and may very well be unlocked with out requiring a password. It has been assessed with excessive confidence that Cellebrite’s expertise was used on the cellphone on or round July 20 and July 21, 2025.
“Using Cellebrite may have enabled the complete extraction of all supplies from Mwangi’s machine, together with messages, personal supplies, private recordsdata, monetary data, passwords, and different delicate data,” the Citizen Lab stated.
The newest findings observe a separate report launched final month, through which the researchers stated officers in Jordan doubtless used Cellebrite to extract data from the cellphones of activists and human rights defenders who had been important of Israel and spoke out in help of Palestinians in Gaza.
The gadgets had been seized by Jordanian authorities throughout detentions, arrests, and interrogations, and subsequently returned to them. The documented incidents passed off between late 2023 and mid-2025, the Citizen Lab stated.
In response to the findings, a spokesperson for Cellebrite instructed The Guardian that the corporate’s expertise is used to “entry personal knowledge solely in accordance with authorized due course of or with acceptable consent to assist investigations legally after an occasion has occurred.”
The 2 circumstances add to a rising physique of proof documenting the misuse of Cellebrite expertise by authorities shoppers. It additionally displays a broader ecosystem of surveillance abuses by numerous governments around the globe to allow highly-targeted surveillance utilizing mercenary spyware and adware like Pegasus and Predator.
Predator Spyware and adware Targets Angolan Journalist
The event additionally coincides with one other report from Amnesty Worldwide, which found proof that the iPhone belonging to Teixeira Cândido, an Angolan journalist and press freedom advocate, was efficiently focused by Intellexa’s Predator spyware and adware in Could 2024 after he opened an an infection hyperlink obtained through WhatsApp.
The iPhone was operating iOS 16.2, an outdated model of the working system with identified safety points. It is at the moment not identified what exploit was used to set off the an infection. In a number of experiences printed final yr, Recorded Future revealed that it has noticed suspected Predator operations in Angola courting again to 2024.
“That is the primary forensically confirmed case of the Predator spyware and adware getting used to focus on civil society in Angola,” the worldwide human rights group stated. “As soon as the spyware and adware was put in, the attacker may achieve unrestricted entry to Teixeira Cândido’s iPhone.”
“The Predator spyware and adware an infection seems to have lasted lower than sooner or later, with the an infection being eliminated when Teixeira Cândido’s cellphone was restarted within the night of 4 Could 2024. From that point till 16 June 2024, the attackers made 11 new makes an attempt to re-infect the machine by sending him new malicious Predator an infection hyperlinks. All of those subsequent assault makes an attempt seem to have failed, doubtless because of the hyperlinks merely not being opened.”
In line with an evaluation printed by French offensive safety firm Reverse Society, Predator is a industrial spyware and adware product “constructed for dependable, long-term deployment” and permits operators to selectively allow or disable modules primarily based heading in the right direction exercise, granting them real-time management over surveillance efforts.
Predator has additionally been discovered to include numerous undocumented anti-analysis mechanisms, together with a crash reporter monitoring system for anti-forensics and SpringBoard hooking to suppress recording indicators from victims when the microphone or digital camera is activated, illustrating the sophistication of the spyware and adware. On prime of that, it has express checks to keep away from operating in U.S. and Israeli locales.
“These findings exhibit that Predator’s operators have granular visibility into failed deployments, […] enabling them to adapt their approaches for particular targets,” Jamf Risk Labs researchers Shen Yuan and Nir Avraham stated. “This error code system transforms failed deployments from black containers into diagnostic occasions.”


