More data, More devices, More extractions

Version7.12  |  UFED 4PC, UFED Touch2, UFED Physical Analyzer  |  December 20, 2018

Simplified extractions and support for new devices and applications

Just when you thought we would pack up for the holidays, the Cellebrite team has been busy fulfilling the last requests of 2018 with a few, exclusive capabilities to kickstart the new year.

First-to-market access to encrypted Android devices running the latest MediaTek chipsets:

MediaTek (MTK) chipsets are mainly found in medium-low tier phones, such as LG, Meizo, Motorola, Huawei, VIVO & OPPO. Most of these phones are encrypted out of the box, so it is difficult to extract the data from them, let alone, unlock the device once a Passcode / PIN / Pattern lock has been set.

In this version, 7.12, we introduce a new, state-of-the-art capability that supports many devices with the latest chipsets, and the full spectrum of capabilities: unlock, file system, physical extractions.

New method to remove screen lock on LG Android devices:

UFED 7.12 also provides an industry-first method for removing screen lock on LG Android Devices. Using this new method, users can now remove the screen lock to gain access to critical evidence from some of the most popular and advanced LG Android-OS devices including H870 G6, H820 G5, LM-X210MA, M210, MP260 and more. Support from more leading vendors such as Motorola, Alcatel, and others, coming in 2019. Stay tuned!

New Dynamic Profile function:

Have you ever encountered an unsupported device resulting in a dead case?
UFED 7.12 simplifies the user experience when encountered with an unsupported device using the new Dynamic Profile function.

With this function, UFED analyzes the device’s properties and utilizes a smart algorithm to automatically build a device profile, and recommends a generic extraction flow.

UFED Physical Analyzer updates:

With UFED Physical Analyzer 7.12, users can access more data from a vast range of iOS and Android applications, uncover essential data from iCloud Apple production sets and decode additional content from archived ZIP files.