The news was a bolt from the blue, the confidentiality of our data is at risk, Russian company Elcomsoft has announced that its software tool Elcomsoft Forensic Disk Decryptor is able to decrypt encryption containers created with TrueCrypt, PGP and BitLocker To Go.
These software are considered the most common and reliable tools used by industry and private businesses to data encryption, access to the containers is impossible without knowing the password used.
ElcomSoft is a company specialized in the providing of encryption cracking software and digital forensic tools, when I read the news I remained shocked … how does the tool work?
The tool is not able to crack the containers has reported by some sources, instead it is able to gather the decryption passwords get stored in computer memory once the user access to encrypted data, the Forensic Disk Decryptor costs £299.
Users typical don’t want to submit their password every time they access to the containers, to allow mounting on-fly of protected storage the tools use protected volumes readily accessible by OSs, this feature is the weakness exploited by the forensics tool.
The official blog post states:
“No one likes typing their long, complex passwords every time they need to read or write a file.As a result, keys used to encrypt and decrypt data that’s being written or read from protected volumes are kept readily accessible in the computer’s operating memory. Obviously, what’s kept readily accessible can be retrieved near instantly by a third-party tool. Such as Elcomsoft Forensic Disk Decryptor.”
Password are available somewhere in the memory, so the tool needs to analyze a memory dump that can be obtained
What’s needed first, however, is a memory dump, which can be grabbed either using forensic tools or using other techniques such as the Firewire attack that allow to forensic application to exploit a seven-year-old FireWire design error to dump memory even for devices that are locked or in sleep mode… grabbing a full memory dump takes only a few minutes.
“What made it possible is a feature of the original FireWide/IEEE 1394 specification allowing unrestricted access to PC’s physical memory for external FireWire devices. Direct Memory Access (DMA) is used to provide that access. As this is DMA, the exploit is going to work regardless of whether the target PC is locked or even logged on. There’s no way to protect a PC against this threat except explicitly disabling FireWire drivers.”
Obviously the encrypted volumes must be mounted at the time a memory dump is done or the PC goes to sleep to avoid the destruction of the decryption keys that allow access to content of encrypted volumes.
The forensic tool produced by Elcomsoft searches for the encryption keys in the memory dump then tries to extract them.
“The new product includes algorithms allowing us to analyze dumps of computers’ volatile memory, locating areas that contain the decryption keys. Sometimes the keys are discovered by analyzing byte sequences, and sometimes by examining crypto containers’ internal structures. When searching for PGP keys, the user can significantly speed up the process if the exact encryption algorithm is known.”
Resuming, the attack works when the computer is switched on, once it is turned off the RAM content is lost, keys included.
Elcomsoft tool automates the process of decryption keys retrieving from dump, the process is already used by forensics analysts but ignored by IT community.
The tool allows a complete decryption and On-the-Fly Access once retrieved the decryption keys from the dump. The blog post reports that Elcomsoft Forensic Disk Decryptor implemets two mechanisms to unlock protected containers:
The Tool is definitely interesting, especially for those who carry out forensic investigations by automating analysis processes … and it is cheap, characteristics appreciated in times of crisis 😉
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.