Hacker Steals iPhone Cracking Tools used by FBI, Leaks it publically

Written by TechNadu Staff
Last updated June 16, 2021

A hacker took a bold statement against the FBI activities to hack iPhones and shows how vulnerable everyone's personal data. Cellebrite created a Cracking tool for iPhone which was reportedly stolen and leaked by the hacker.

Apple and FBI went on a war last year over the iPhone 5C of Syed Farook, the Shooter from San Bernardino, California. FBI insisted apple about unlocking the iPhone but Apple feared about the privacy and rejected it.

FBI ended the battle even though it was a national emergency and decided to work with Israeli firm Cellebrite, which said it would be able to hack the phone with or without Apple’s help.

The mobile phone forensics company cellebrite had sold its phone cracking technology to Turkey, The United Arab Emirates, and Russia according to the data.

If you take a look at the report by Motherboard, the hacker told "the creation of such tools makes their public release inevitable, and that they can subsequently be used by anyone with a bit of technical knowledge — including those who might not have such good intentions."

The hacker's ASCII art, which reads "backdoorz."

The hacker's ASCII art, which reads "backdoorz."

"The ripped, decrypted and fully functioning Python script set to utilize the exploits is also included within," the hacker wrote in a README file accompanying the data dump. The hacker posted links to the data on Pastebin.

Cellebrite has refused to claim that it was hacked and proposing that it code dumped could be obtained from customers of Cellebrite app. A rumor has it that the company may be lying about the breach.

It hadn't claimed about the hack or the FBI Cracking tool got posted by the hacker is true or not. But the message from the hacker is for sure:"@FBI Be careful in what you wish for"

For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: