iOS cracking tools reportedly used by FBI released to public

cracking

Last year, the FBI ordered Apple to help crack the iPhone 5c owned by Syed Farook, one of the shooters in the 2015 attacks in San Bernardino. Apple refused, and the FBI reportedly worked with Cellebrite, an Israeli firm that specializes in mobile security. According to a statement from Celelbrite last month, a hacker breached one of its legacy servers. Now the hacker has released some of that data as a warning to the FBI.

The data released includes code that seems to relate to Cellebrite’s Universal Forensic Extraction Device (UFED), and can allegedly crack older iPhones like the 5c as well as Android and Blackberry devices.

Speaking anonymously to Motherboard, the hacker explained that simply creating these tools makes their release inevitable, where they can be used by anyone with technical knowledge, including oppressive regimes around the world.

“It’s important to demonstrate that when you create these tools, they will make it out. History should make that clear,” they told Motherboard.

Claiming to have taken the tools from Cellebrite’s own servers, the hacker says they were able to get into the encrypted files and post them on Pastebin, a popular code repository. Some of the code seems to have been lifted from publically accessible jailbreaking code, as well.

Advertisements

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.