|By PR Newswire||
|January 30, 2014 05:00 AM EST||
MOSCOW, January 30, 2014 /PRNewswire/ --
ElcomSoft Co. Ltd. updates iOS Forensic Toolkit, adding physical acquisition support for jailbroken iOS 7 devices. Physical acquisition support is now available for jailbroken devices running Apple iOS 7 including iPhone 4S, 5 and 5C, iPad 2nd to 4th gen, iPad Mini, iPod Touch 5th gen, and either having no passcode protection or carrying a jailbreak installed. In addition, the new release adds support for previously unavailable versions of iOS 6.1.3-6.1.5.
With more than 83% of all iOS devices now running iOS 7, ElcomSoft gives the mobile forensic industry a boost. Elcomsoft iOS Forensic Toolkit is still remaining the only commercially available forensic product that is able to perform physical acquisition of iPhone 4S, iPad 2 and newer generation hardware.
Physical acquisition allows extracting information from Apple's protected storage, the keychain. In many cases, the enhanced iOS 7 keychain contains the original passwords to Apple ID accounts. This allows investigators seamlessly accessing information stored in the iCloud as well as tracking the users' geolocation coordinates in real-time by using the Apple iCloud Find My Phone service.
At this time, physical acquisition of last-generation iOS 7 devices is only possible if either of the following is true:
- There is no passcode protection on the device, or
- The investigator knows the passcode, or
- The device has been jailbroken by the user
"Apple users are fast when it comes to upgrades," says Vladimir Katalov, ElcomSoft CEO. "The latest version of iOS, iOS 7, is already installed on some 83 per cent of compatible devices. We are proud to be the first to make a tool for our customers that gives them access to valuable information stored in these devices."
At this time, 8 models of iPhone, 7 models of iPad and 5 generations of iPod Touch are available. With more than 700 million iOS devices around and 83% of them using iOS 7, the updated iOS Forensic Toolkit opens the door to acquiring information from some 580 million devices.
iOS 7 Physical Acquisition
Physical acquisition has long been the method of choice for accessing information stored in iOS devices among law enforcement and forensic customers. Physical acquisition allows investigators obtain the complete bit-precise image of the device in real time, including device secrets and unallocated data blocks that may contain deleted files and destroyed evidence. Physical acquisition returns significantly more information from the device than any other method such as logical acquisition or backup analysis, including data stored in Apple's protected storage, the keychain.
Finally, physical acquisition operates on a fixed-timeframe basis, which guarantees timely delivery of the entire contents of the device. Acquisition time depends on the model of the device being acquired, as well as on the amount of memory carried by that device. For example, acquisition time for a 32-GB iPhone 5 device is 25 minutes, while a 32-GB iPhone 4 with a slower controller is acquired in approximately 40 minutes.
With the release of iPhone 4S featuring stronger security, physical acquisition became impossible to all but ElcomSoft customers. Elcomsoft iOS Forensic Toolkit has been the first and remains the only commercially available product that can perform physical acquisition of last-generation Apple hardware running the latest versions of iOS up to and including iOS 7.
On jailbroken iOS 7 devices, iOS Forensic Toolkit can break the original passcode with brute force or dictionary attack. Passcode recovery speed on jailbroken iPhone 5 and 5C devices is approximately 15.5 passcodes per second, allowing iOS Forensic Toolkit to break typical 4-digit passcodes in about 10 minutes.
Physical Acquisition Benefits
Physical acquisition offers numerous benefits over other acquisition methods. Fixed timeframe and guaranteed delivery are just a few things to mention. Physical is the only acquisition method that can extract the following information:
- Cached (downloaded) mail, regardless of the type of email account. Cached mail is not available in offline or online backups.
- Geolocation data. While iTunes and iCloud backups contain only some very basic geolocation data, physical acquisition extracts comprehensive information including frequent locations and geolocation data requested by all Apple and third-party applications and system services. Geolocation information is requested (and stored) on many events such as using maps, calibrating the compass, for the purpose of tracking advertisements, when looking for mobile and Wi-Fi networks, etc. As a result, comprehensive geolocation data extracted with physical acquisition makes it possible to create a precise reconstruction of the phone owner's whereabouts for every minute of time.
- System logs and crash logs, detailing which applications were launched or installed.
- Cached application data, such as cached Web pages and addresses, and many other types of data are only available via physical acquisition. Considering that many iOS applications are using Internet access, the amount of cached data available via physical acquisition can be overwhelming.
Extended Keychain Acquisition
iOS 7 introduced some changes to the format and content of Apple's protected storage, the keychain. In iOS 7 devices, a device registered to a certain Apple ID may contain a cached copy of the iCloud keychain for that Apple account, depending on whether or not the user authorized this feature. If present, this data opens a whole new perspective to forensic specialists, enabling instant access to stored passwords and credit card information stored in other Apple devices on the same Apple ID.
iCloud Access as a Bonus
iOS 7 keeps more information in the keychain than any previous version of iOS. As a result, investigators performing physical acquisition may be able to receive, among other things, the online credentials required to log in to Apple iCloud (subject to certain conditions). If present, this information enables forensic specialists to download information Apple iCloud, acquiring online backups to all iOS devices registered on the same account. A separately available product, Elcomsoft Phone Password Breaker, is required to download information from the iCloud. In addition, by using Find My Phone service from Apple iCloud investigators can track geographic location of iOS devices on that account in real time.
Windows and Mac OS X versions of Elcomsoft iOS Forensic Toolkit are available. Physical acquisition support for the various iOS devices varies depending on lock state, jailbreak state and the version of iOS installed.
The tool can perform physical acquisition of the following iOS devices regardless of lock and jailbreak state, and regardless of iOS version:
- Legacy iPhone models up to and including iPhone 4, all GSM & CDMA models supported
- The original iPad
- iPod Touch generations 1 through 4
Physical acquisition can be performed for the following models if they are running iOS 5, all versions of iOS 6, or iOS 7 and are jailbroken, or if jailbreak code can be installed by the investigator:
- iPhone 4S, 5 and 5C
- iPad 2, 3 and 4
- iPad Mini
- iPod Touch 4th and 5th gen
Support for iPhone 5S, iPad Air and iPad Mini with Retina is under development.
For non-jailbroken iOS 7 devices with unknown passcode physical acquisition support is currently unavailable.
About Elcomsoft iOS Forensic Toolkit
Elcomsoft iOS Forensic Toolkit provides forensic access to encrypted information stored in popular Apple devices running iOS versions 3 to 7. By performing a physical acquisition analysis of the device itself, the Toolkit offers instant access to all protected information including SMS and email messages, call history, contacts and organizer data, Web browsing history, voicemail and email accounts and settings, stored logins and passwords, geolocation history, the original plain-text iTunes password and conversations carried over various social networks such as Facebook, as well as all application-specific data saved in the device. The tool can also perform logical acquisition of iOS devices, or provide forensic access to encrypted iOS file system dumps.
About ElcomSoft Co. Ltd.
Founded in 1990, ElcomSoft Co.Ltd. is a global industry-acknowledged expert in computer and mobile forensics providing tools, training, and consulting services to law enforcement, forensics, financial and intelligence agencies. ElcomSoft pioneered and patented numerous cryptography techniques, setting and exceeding expectations by consistently breaking the industry's performance records. ElcomSoft is Microsoft Gold Independent Software Vendor, Intel Software Premier Elite Partner, member of Russian Cryptology Association (RCA) and Computer Security Institute.
The IoT has the potential to create a renaissance of manufacturing in the US and elsewhere. In his session at 18th Cloud Expo, Florent Solt, CTO and chief architect of Netvibes, will discuss how the expected exponential increase in the amount of data that will be processed, transported, stored, and accessed means there will be a huge demand for smart technologies to deliver it. Florent Solt is the CTO and chief architect of Netvibes. Prior to joining Netvibes in 2007, he co-founded Rift Technol...
Apr. 28, 2016 07:00 PM EDT Reads: 1,450
Join IBM June 8 at 18th Cloud Expo at the Javits Center in New York City, NY, and learn how to innovate like a startup and scale for the enterprise. You need to deliver quality applications faster and cheaper, attract and retain customers with an engaging experience across devices, and seamlessly integrate your enterprise systems. And you can't take 12 months to do it.
Apr. 28, 2016 04:45 PM EDT Reads: 1,710
This is not a small hotel event. It is also not a big vendor party where politicians and entertainers are more important than real content. This is Cloud Expo, the world's longest-running conference and exhibition focused on Cloud Computing and all that it entails. If you want serious presentations and valuable insight about Cloud Computing for three straight days, then register now for Cloud Expo.
Apr. 28, 2016 04:30 PM EDT Reads: 1,601
IoT device adoption is growing at staggering rates, and with it comes opportunity for developers to meet consumer demand for an ever more connected world. Wireless communication is the key part of the encompassing components of any IoT device. Wireless connectivity enhances the device utility at the expense of ease of use and deployment challenges. Since connectivity is fundamental for IoT device development, engineers must understand how to overcome the hurdles inherent in incorporating multipl...
Apr. 28, 2016 02:45 PM EDT Reads: 1,345
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, will discuss how research has demonstrated the value of Machine Learning in delivering next generation analytics to im...
Apr. 28, 2016 02:30 PM EDT Reads: 1,536
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, will discuss how leveraging the Industrial Interne...
Apr. 28, 2016 01:15 PM EDT Reads: 1,071
The paradigm has shifted. A Gartner survey shows that 43% of organizations are using or plan to implement the Internet of Things in 2016. However, not just a handful of companies are still using the old-style ad-hoc trial-and-error ways, unaware of the critical barriers, paint points, traps, and hidden roadblocks. How can you become a winner? In his session at @ThingsExpo, Tony Shan will present a methodical approach to guide the holistic adoption and enablement of IoT implementations. This ov...
Apr. 28, 2016 01:00 PM EDT Reads: 1,484
SYS-CON Events announced today that Stratoscale, the software company developing the next generation data center operating system, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Stratoscale is revolutionizing the data center with a zero-to-cloud-in-minutes solution. With Stratoscale’s hardware-agnostic, Software Defined Data Center (SDDC) solution to store everything, run anything and scale everywhere...
Apr. 28, 2016 12:45 PM EDT Reads: 1,437
Angular 2 is a complete re-write of the popular framework AngularJS. Programming in Angular 2 is greatly simplified – now it's a component-based well-performing framework. This immersive one-day workshop at 18th Cloud Expo, led by Yakov Fain, a Java Champion and a co-founder of the IT consultancy Farata Systems and the product company SuranceBay, will provide you with everything you wanted to know about Angular 2.
Apr. 28, 2016 12:15 PM EDT Reads: 1,582
Digital payments using wearable devices such as smart watches, fitness trackers, and payment wristbands are an increasing area of focus for industry participants, and consumer acceptance from early trials and deployments has encouraged some of the biggest names in technology and banking to continue their push to drive growth in this nascent market. Wearable payment systems may utilize near field communication (NFC), radio frequency identification (RFID), or quick response (QR) codes and barcodes...
Apr. 28, 2016 12:00 PM EDT Reads: 510
SYS-CON Events announced today that Men & Mice, the leading global provider of DNS, DHCP and IP address management overlay solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. The Men & Mice Suite overlay solution is already known for its powerful application in heterogeneous operating environments, enabling enterprises to scale without fuss. Building on a solid range of diverse platform support,...
Apr. 28, 2016 11:30 AM EDT Reads: 2,158
You deployed your app with the Bluemix PaaS and it's gaining some serious traction, so it's time to make some tweaks. Did you design your application in a way that it can scale in the cloud? Were you even thinking about the cloud when you built the app? If not, chances are your app is going to break. Check out this webcast to learn various techniques for designing applications that will scale successfully in Bluemix, for the confidence you need to take your apps to the next level and beyond.
Apr. 28, 2016 11:00 AM EDT Reads: 1,380
The increasing popularity of the Internet of Things necessitates that our physical and cognitive relationship with wearable technology will change rapidly in the near future. This advent means logging has become a thing of the past. Before, it was on us to track our own data, but now that data is automatically available. What does this mean for mHealth and the "connected" body? In her session at @ThingsExpo, Lisa Calkins, CEO and co-founder of Amadeus Consulting, will discuss the impact of wea...
Apr. 28, 2016 10:30 AM EDT Reads: 507
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Apr. 28, 2016 10:15 AM EDT Reads: 919
SYS-CON Events announced today that Ericsson has been named “Gold Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. Ericsson is a world leader in the rapidly changing environment of communications technology – providing equipment, software and services to enable transformation through mobility. Some 40 percent of global mobile traffic runs through networks we have supplied. More than 1 billion subscribers around the world re...
Apr. 28, 2016 10:00 AM EDT Reads: 659
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, will provide tips on how to be successful in large scale machine lear...
Apr. 28, 2016 10:00 AM EDT Reads: 700
SYS-CON Events announced today that Fusion, a leading provider of cloud services, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Fusion, a leading provider of integrated cloud solutions to small, medium and large businesses, is the industry's single source for the cloud. Fusion's advanced, proprietary cloud service platform enables the integration of leading edge solutions in the cloud, including cloud...
Apr. 28, 2016 09:30 AM EDT Reads: 2,490
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
Apr. 28, 2016 09:00 AM EDT Reads: 507
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
Apr. 28, 2016 09:00 AM EDT Reads: 940
In his session at @ThingsExpo, Chris Klein, CEO and Co-founder of Rachio, will discuss next generation communities that are using IoT to create more sustainable, intelligent communities. One example is Sterling Ranch, a 10,000 home development that – with the help of Siemens – will integrate IoT technology into the community to provide residents with energy and water savings as well as intelligent security. Everything from stop lights to sprinkler systems to building infrastructures will run ef...
Apr. 28, 2016 08:45 AM EDT Reads: 395