Feds may already have found a way to hack into Apple iPhones

Credit to Author: Lucas Mearian| Date: Tue, 14 Jan 2020 12:30:00 -0800

After Apple turned down a request by U.S. Attorney General William Barr this week to unlock two iPhones used by a terrorist suspect in a recent deadly shooting, the FBI appears to already have the tools needed to access the smartphones.

Apple turned down a request from U.S. Attorney General William Barr saying it would  not help unlock two iPhones used by the shooter, 21-year-old Mohammed Saeed Alshamrani. He is believed to have acted alone when he shot and killed three service members and wounded several others at the Naval Air Station in Pensacola, Fla. last month.

Alshamrani, a member of the Saudi Air Force and an aviation student at the base, was shot dead on the scene by police.

The back-and-forth between Apple and the Department of Justice is the latest scuffle involving the company’s privacy stance and government efforts to get around that it.

A search warrant, first discovered by Forbes, however, indicated the FBI already has the blackbox technology necessary to crack password-protected smart phones.

According to that warrant, FBI investigators in Ohio last year used technology from Atlanta-based Grayshift to access a locked iPhone 11 Pro Max, which belonged to Baris Ali Koch. Koch was accused of helping his brother, who’d been convicted of a hate crime, flee the country.

Atlanta-based Grayshift is one of two companies that claimed it could thwart Apple iPhone passcode security through brute-force attacks. The other is Israeli-based Cellebrite. Both companies claimed they could get around iPhone security through brute-force attacks and full file-system extraction, or a physical extraction or full file system (File-Based Encryption) extraction on many high-end Android device.

Cellebrite’s UFED Cloud Analyzer tool can purportedly unlock, decrypt and extract phone data, including “real-time mobile data … call logs, contacts, calendar, SMS, MMS, media files, apps data, chats, passwords,” according a document obtained through a Freedom of Information Act request filed by the Electronic Privacy Information Center (EPIC).

Grayshift’s GrayKey blackbox could apparently unlock an iPhone in about two hours if the owner used a four-digit passcode and in about three days or longer if a six-digit passcode was used.

In 2018, Apple said it was able to resecure its iPhone against Grayshift’s GrayKey blackbox through an iOS update. The FBI warrant, however, indicates that update may not have been as succesful as Apple hoped.

Regardless, the government still appears to prefer that Apple simply put a backdoor in its platform for law enforcement to access during criminal investigations.

If the government succeeds in forcing Apple to subvert iPhone security, corporate IT managers will be put in a sticky situation, said Alan Butler, general counsel for EPIC. That’s because most employees either use smartphones under “bring your own device” (BYOD) policies or rely on company devices to conduct business and transfer sensitive information, whether it’s communications or data schematics.

“That’s a lot of sensitive information that may be privileged, that may be trade secrets or covered by [International Traffic in Arms Regulations (ITAR)] – so [it’s] things you have a legal obligation to protect,” Butler said. “So companies also need assurances that the hardware they’re deploying is secure. If the government is ordering the company to introduce flaws into the security of the hardware or software … it could compromise that corporate data.”

Apple disputed Barr’s claim that it hadn’t given “substantative assistance” in the investigation, noting it provided access to the cloud service used to back up data on Alshamrani’s phones.

“Our responses to their many requests since the attack have been timely, thorough and are ongoing,” Apple said. “Within hours of the FBI’s first request on December 6th, we produced a wide variety of information associated with the investigation. From December 7th through the 14th, we received six additional legal requests and in response provided information including iCloud backups, account information and transactional data for multiple accounts.”

Reiterating its past stance against backdoors, Apple said: “We have always maintained there is no such thing as a backdoor just for the good guys. Backdoors can also be exploited by those who threaten our national security and the data security of our customers. Today, law enforcement has access to more data than ever before in history, so Americans do not have to choose between weakening encryption and solving investigations. We feel strongly encryption is vital to protecting our country and our users’ data.”

Kurt Opsahl, deputy executive director of the non-profit digital rights advocacy group Electronic Frontier Foundation, said Apple is right to provide strong security to its users, requiring a passcode or biometrics to unlock their smartphones.

“The Attorney General’s request that Apple re-engineer its phones to break that security imperils millions of innocent Americans and others around the globe, and is a poor trade-off for security policy,” Opsahl said.

Vladimir Katalov, CEO of Russian forensic tech provider ElcomSoft, called Barr’s request unrealistic because Apple can’t “technically” unlock iPhones because of file-based encryption and secure enclave technology; it boots up separately from iOS and runs its own microkernel not directly accessible by the iPhone operating system.

“Of course, it is technically possible to add backdoors, implement escrow keys and things like that. But first, one cannot legally regulate the technology – secure communication channels and [secure data storage] will still remain… and no government can force any person not to use the encryption, or use only a ‘certified’ one,” Katalov said via email. “Second, such backdoors will be exploited by criminals now or later. The consequences may be catastrophic.”

By including a method to unlock smartphones at will, Apple would be opening up all of its smartphones to potential attacks by any bad actor, Katalov said.

The latest request by the Justice Department is part of an ongoing struggle between law enforcement and Apple. In 2016, the Justice Department, backed by a federal court injunction, ordered Apple to unlock the iPhone of Syed Rizwan Farook, a suspect in the San Bernadino terrorist attack, in December of that year.

At the time, Apple CEO Tim Cook said his company couldn’t give the FBI any more help, claimed that utilizing the law justifying the court’s order was “unprecedented” and again refused to help unlock the iPhone.

http://www.computerworld.com/category/security/index.rss

Leave a Reply