Hacker Leaks Cellebrite’s iPhone unlocking tools online

Hacker who hacked Cellebrite leaks โ€˜iOS Cracking Toolsโ€™ On Pastebin

More than a year ago, the U.S. government had hired an Israel security firm โ€˜Cellebriteโ€™ to break into an iPhone 5c to assist with the investigation of the December 2015 San Bernardino terror attack when Apple refused to help crack the iPhone.

For those unfamiliar, Cellebrite is an Israeli company, which specializes in extracting data from mobile phones for law enforcement agencies. The firmโ€™s main product is called the Universal Forensic Extraction Device (UFED) โ€“ a tool designed to extract smartphone data, which is being used extensively by the U.S. and UK police.

Reportedly, in January this year, the same Israeli firm suffered a major data breach wherein 900GB worth of data was stolen. However, now the person claiming responsibility has publicly released a cache of Cellebrite’s most sensitive data on Pastebin, including its tools used to hack into older iPhones, as well as Android and BlackBerry smartphones, according to Motherboard.

The individual claimed to have extracted the data from UFED images, bypassing Cellebrite’s encryption. The intention behind the leak was to highlight the importance of the inevitability that any brute force tools aimed at bypassing encryption software “will make it out” into the public.

“The debate around backdoors is not going to go away, rather, itโ€™s almost certainly going to get more intense as we lurch toward a more authoritarian society,” the hacker told Motherboard in an online chat.

“It’s important to demonstrate that when you create these tools, they will make it out. History should make that clear,” they continued.

However, a Cellebrite spokesperson claimed that no source code was stolen in the attack.

Tony Gauda, CEO of data security firm ThinAir, argued that the Cellebrite breach is a โ€œprivacy advocateโ€™s nightmare come true.โ€

โ€œWhile the legitimacy of the files leaked today hasnโ€™t been confirmed, this incident is a clear example of why backdoors are seen as a double-edged sword by members of the technology community,โ€ he added. โ€œSoftware exploits that allow law enforcement to exfiltrate data during criminal investigations become extremely dangerous when in the wrong hands, and firms such as Cellebrite must acknowledge the huge target they have on their backs.โ€

Kavita Iyer
Kavita Iyerhttps://www.techworm.net
An individual, optimist, homemaker, foodie, a die hard cricket fan and most importantly one who believes in Being Human!!!

Subscribe to our newsletter

To be updated with all the latest news

Read More

Suggested Post