MOBILedit Forensic 9.8: Advanced Bypassing & 16 Languages

What’s New:

MOBILedit UI and reports available in 16 languages!

MOBILedit is designed for ease of use, and we continuously work to further simplify workflows for investigators. Version 9.8 introduces expanded language support. Both the UI and reports are now available in 16 languages, including French, Italian, German, Ukrainian, Arabic, Vietnamese, Czech, Spanish, Estonian, Japanese, Korean, Dutch, Polish, Portuguese, Slovak, and Chinese.

Is there a language you’d like to see added? Let us know – we’d be happy to expand our language options even further!

 

Smartwatch forensics expanded: Root access and data beyond recorded activities

As a pioneer in smartwatch forensics, MOBILedit continues to expand the depth of data extraction and analysis. For Samsung watches, it is now possible to extract heart rate data even when no activity is running — capturing data points at regular intervals (every 10 minutes) over extended periods and enabling evaluation of long-term health and behavioral patterns. Samsung network diagnostics data has also been added, further expanding available data sources.
With recent updates, root access is now supported on Samsung Galaxy Watch devices, including the latest Galaxy Watch Series 8, significantly expanding extraction capabilities.

On Garmin devices, extended analysis now includes total time spent in activities, schedules, and workouts, providing a more complete behavioral timeline.
This enables investigators to reconstruct timelines, validate statements, and identify behavioral patterns even outside recorded activities.

 

Advanced UNISOC and EXYNOS security bypassing

Advanced security bypass capabilities for UNISOC and EXYNOS devices included in version 9.8 were delivered earlier through Live Updates — ensuring investigators have immediate access to the latest methods as soon as they become available, without waiting for major software releases.

On UNISOC devices, it is now possible to extract a full physical image, decrypt data, and perform bruteforce on supported chipsets, enabling full access to user data.

For EXYNOS, a newly developed method significantly expands device coverage and enables root access across a much wider range of devices, including those with the latest security patches. This capability also extends to Samsung Galaxy Watch devices, including the latest Galaxy Watch Series 8, where root access is now possible.

Read more about the UNISOC and EXYNOS security bypassing updates here:
MOBILedit New Live Updates: Advanced UNISOC & EXYNOS Security Bypassing — MOBILedit

Field-ready licensing: Offline support for network licenses

Network licenses can now be used in offline mode, allowing investigators to temporarily transfer a license from the lab to the field. This enables full use of MOBILedit in environments without network connectivity, supporting operational flexibility in field work.


Improvements

  • Added analysis for new applications, including Apexmove (used with Kospet smartwatches).

  • Updated and expanded analysis for existing applications, including Google Authenticator, WhatsApp, and DingTalk.

  • Complete list of added and updated applications here.

  • Smart Screenshots now work without requiring the Connector app on the device.

  • Improved Smart Screenshots workflow with faster application loading.

  • Fixed access to the Android Keystore on Android 14 and newer, including Samsung watches.

  • Improved detection of whether App Downgrade can be performed across applications and devices.

  • Additional information is now available for iOS SIM cards.

 

Fixes

  • Imported backups are now automatically preselected in the UI.

  • Fixed detection of encryption state on Samsung devices.

  • Fixed decryption for some Samsung MTK physical images.

  • Multiple analysis fixes, including iOS Notes and iOS SMS.

  • Improved APK parsing to obtain maximum application metadata.

  • Fixed listing of apps in Samsung Secure Folder.

  • Fixed failures when analyzing messages on iOS.

  • Fixed an issue where GPS locations were not written into UFDR files when analyzing Garmin watches.