An Israeli mobile forensics firm is reportedly helping the FBI crack the San Bernardino...

midian182

Posts: 9,739   +121
Staff member

It was reported earlier this week that the FBI had filed a motion to delay its trial against Apple over the San Bernardino iPhone. It seems that the government agency had found an outside party capable of unlocking the device and no longer required Apple’s help.

At the time, we didn’t know who this third party was, but according to Israel-based newspaper Yedioth Ahronoth, the company helping the Department of Justice crack Syed Rizwan Farook’s iPhone 5c is an Israeli mobile forensics company called Cellebrite.

The company’s UFED mobile extraction device series claims to offer “unparalleled data extraction and analysis capabilities.” One product in particular, the UFED Touch, can supposedly “bypass pattern lock/password/PINs” on Android devices, as well as offering “the widest support for extraction and decoding” for Apple products.

The Vice President of Cellebrite’s forensics division, Leeor Ben-Peretz, wouldn’t comment on the Apple case when speaking to Israeli news outlet Haaretz, but he did indicate his belief that all devices can be broken into, no matter how hack-proof they may seem.

If Cellebrite really is helping the FBI, the exact method it is using to decrypt the iPhone is still a mystery. But one person who’s already had plenty to say about the ongoing saga, John McAfee, told CNBC that he knows how Cellebrite will do it.

"I promise you that Tim Cook and Apple are not going to be happy with the solution that the FBI has come up with […] because it is almost as bad as a universal master key,” he told CNBC’s Power Lunch.

McAfee, of course, had previously offered to help the FBI crack the iPhone with his team of super hackers using mostly social engineering techniques. He later admitted that this was all a lie to draw attention to the fact that “the FBI is trying to [fool] the American public.”

Experts believe that Cellebrite will use a NAND mirroring technique to circumvent the iPhone’s built-in security measures. This method involves desoldering the NAND chip, copying all its data using a device capable of reading/writing NAND flash, replacing the chip, and then guessing passcodes. If the auto-erase feature is enabled and the iPhone is wiped, it’ll be a case of removing the chip, copying the original information back in, and replacing it. It’ll be possible to add a test socket to make the chip swapping faster and easier.

This NAND technique will work on the iPhone 5c in question as it doesn’t have a Secure Enclave; it can't used on any phones beyond the 5s.

Permalink to story.

 
Confirming what was assumed from the start: Apple's et. al. security is not the swiss cheese many were claiming to be.

The core issues will be back in court a few years down the road, though, once Apple and all of their competitors "patch" this vulnerability.

Coincidentally, that fix will boost all of their sales. "[phone here] - Now more secure than ever!"
 
The core issues will be back in court a few years down the road, though, once Apple and all of their competitors "patch" this vulnerability.

Presumably by that time Apple will have developed hardware security measures that they themselves won't be able to circumvent even if ordered by a court to do so. The FBI and other government agencies hell bent on circumventing current generation security and encryption methods are actually creating an age of forced evolution wherein more sophisticated methods are developed at a much faster pace than normal. It will be interesting to see what level of security and encryption we have 5 years down the line.
 
Did you actually read the article? The "security flaw" - which involves a crazy amount of effort, has already been addressed and will only work in iPhones older than a 5s.... Fortunately, the iPhone in question is a 5c, and so it might be doable....
 
Did you actually read the article? The "security flaw" - which involves a crazy amount of effort, has already been addressed and will only work in iPhones older than a 5s.... Fortunately, the iPhone in question is a 5c, and so it might be doable....

Yes. The benefit to security here is that on-going research will be focused on additional hardware failsafes, based on how specifically this exploit is executed. As umbala said, the FBI and the contracting firm have upped the evolutionary ante.
 
Back