Hacker Reportedly Dumps ‘iOS Cracking Tools’ Used by Cellebrite

It's been nearly a year since a U.S. federal judge originally ordered Apple to help the FBI hack into an iPhone owned by Syed Farook, one of the shooters in the December 2015 attacks in San Bernardino. As we learned in the months after the initial court order -- which Apple continually opposed -- the FBI enlisted the help of Israeli mobile software developer Cellebrite to open up the iPhone 5c in question.

Motherboard reports that a hacker has claimed access to Cellebrite servers, and, as a result, has dumped data from a variety of different devices, from BlackBerry to Android, and “older iPhones.” Specifically, the same publication reported back in January that Cellebrite had 900GB of data stolen, which indicated that the company sold its phone cracking technology to a variety of different countries.
    “Now the hacker responsible has publicly released a cache of files allegedly stolen from Cellebrite relating to Android and BlackBerry devices, and older iPhones, some of which may have been copied from publicly available phone cracking tools.“The debate around backdoors is not going to go away, rather, its is almost certainly going to get more intense as we lurch toward a more authoritarian society,” the hacker told Motherboard in an online chat.”
The data dump would effectively prove, or help Apple prove, its argument that a backdoor, while a great solution in the moment, leaves customers and companies potentially exposed after the fact. The unnamed hacker, speaking to Motherboard made this abundantly clear, reiterating that, even if Cellebrite’s cracking tools require that they have physical access to the device to pull its contents, what they store in their servers after the fact does not have the same guidelines.
“It’s important to demonstrate that when you create these tools, they will make it out. History should make that clear,” they continued.”
 You've been warned!


blog comments powered by Disqus
Octofinder Blog Catalog