In 2016, FBI-ul urged Apple to unlock Syed Farook’s phone, one of the San Bernardino attackers.

However, the American company refused to obey.

That’s why FBI started a collaboration with Cellebrite – an Israeli company specialized in mobile security.

According to a press release from Cellebrite, a hacker accessed their server and they are now alerting the Bureau.

The data published by the hacker include code lines from Universal Forensic Extraction Device.

This is an app launched by Cellebrite an unlocking tool for older iPhones, like the 5c but also for Android or Blackberry.

The hacker offered an exclusive anonymous interview published by Engadget.com, in which he explains the simple existence of these tools makes their public appearance impossible.

‘It’s important to demonstrate that when you create these tools, they will end up in the public eye’, declared the hacker.

The hacker claims he recovered the tools from the Cellebrite server and the encrypted data.

Another spokesperson of the company declared the published files don’t include a source-code.

Apple CEO Tim Cook declared that this backdoor software represents a great danger to our public safety.

For now, the tools that surfaced online don’t include the unlocking methods and devices.

However, the threat launched by hackers is real: once created, these apps will never remain private for too long.