Feeds

Off-the-shelf forensics tool slurps iPhone data via iCloud

Cops don't need your actual phone any more

Internet Security Threat Report 2014

ElcomSoft has updated its mobile forensics software to include the ability to retrieve online backups from Apple iCloud storage.

The enhancement to Elcomsoft Phone Password Breaker adds the capability to retrieve user data associated with iPhones from Apple's iCloud online backup service. Backups to multiple devices registered with the same Apple ID can be retrieved using the technology, providing investigators has access to a user's original Apple ID and password.

The approach means that investigators need not have physical access to Jesus phones in order to recover unencrypted copies of data they hold.

Elcomsoft Phone Password Breaker launched with the ability to retrieve user content from password-protected backups created on Apple iPhones and BlackBerry smartphones. The password breaker only facilitated the recovery of passwords protecting offline backups not data held in the cloud.

Access to data stored in iCloud online backup service is of interest to forensic investigators, not least because the facility has been used by millions of fanbois for data backup and device synchronisation since its introduction last June. Apple's iCloud online backup service offers an alternative (or additional safety net) to backing up device data locally onto computers using iTunes.

iCloud backups offer a near real-time copy of information stored on iPhones including emails, call logs, text messages and website visits. iCloud backups are incremental. When set up to use the iCloud service, iPhones automatically connect to iCloud network and backup their content every time a docked device gets within reach of a Wi-Fi access point.

"While other methods require the presence of the actual iPhone device being analyzed or at least an access to device backups this is not the case with iCloud," ElcomSoft chief exec Vladimir Katalov explained. "With a valid Apple ID and a password, investigators can not only retrieve backups to seized devices, but access that information in real-time while the phone is still in the hands of a suspect."

The technology is marketed to computer forensics consultants, law enforcement and intelligence organisations. Investigators using the technology still need iCloud login credentials, which can't be obtained with Elcomsoft Phone Password Breaker alone. Logging into iCloud requires an Apple ID and password.

This password, if not already known, can be acquired from an offline backup produced with Apple iTunes, and "used by investigators to watch suspects' activities by monitoring changes to their online iCloud backups," Elcomsoft explains.

"If investigators don't have Apple ID and password, they can always try to get them and there are plenty of scenarios (both more and less sophisticated) to do so," Elcomsoft spokeswoman Olga Koksharova told El Reg. "Getting Apple ID credentials may be a challenge, however there are numerous ways and places to find them or their traces on all iCloud devices registered to the same Apple ID."

"Investigators can try to get physical access to a left alone Apple gadget (including laptops) and search it (e.g. its FileVault, which can take less than a minute if it's unlocked), or take a physical image of one of i-devices (e.g. there is EIFT to acquire iPhone contents within 20 minutes or so), or search any other private/corporate stationary PC/Mac because the credentials can also be cached in web browser when the suspect tried to enter iCloud from the web browser, or social engineer at least," she added.

However they eventually manage to get iCloud login credentials, investigators are subsequently relieved of the need to crack backup encryption passwords. The data is smoothly downloaded directly onto their computers from Apple remote storage facilities in plain, unencrypted form.

A blog post by Elcomsoft explaining how the technology works can be found here. ®

Beginner's guide to SSL certificates

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.