Accessing to PGP, TrueCrypt, and BitLocker encrypted containers with a £300 tool

BitLocker Drive Encryption

BitLocker Drive Encryption (Photo credit: Wikipedia)

 

Securityaffairs.com

 

The news was a bolt from the blue, the confidentiality of our data is at risk, Russian company Elcomsoft has announced that its software tool Elcomsoft Forensic Disk Decryptor is able to decrypt encryption containers created with  TrueCrypt, PGP and BitLocker To Go.

 

These software are considered the most common and reliable tools used by industry and private businesses to data encryption, access to the containers is impossible without knowing the password used.

ElcomSoft is a company specialized in the providing of encryption cracking software and digital forensic tools, when I read the news I remained shocked … how does the tool work?

The tool is not able to crack the containers has reported by some sources, instead it is able to gather the decryption passwords get stored in computer memory once the user access to encrypted data,  the Forensic Disk Decryptor costs £299.

ForensicsDiskEncryption

Users typical don’t want to submit their password every time they access to the containers, to allow mounting on-fly of protected storage the tools use protected volumes readily accessible by OSs, this feature is the weakness exploited by the forensics tool.

The official blog post states:

 “No one likes typing their long, complex passwords every time they need to read or write a file.As a result, keys used to encrypt and decrypt data that’s being written or read from protected volumes are kept readily accessible in the computer’s operating memory. Obviously, what’s kept readily accessible can be retrieved near instantly by a third-party tool. Such as Elcomsoft Forensic Disk Decryptor.”

Password are available somewhere in the memory, so the tool needs to analyze a memory dump that can be obtained

What’s needed first, however, is a memory dump, which can be grabbed either using forensic tools or using other techniques such as the Firewire attack that allow to forensic application to exploit a seven-year-old FireWire design error to dump memory even for devices that are locked or in sleep mode… grabbing a full memory dump takes only a few minutes.

“What made it possible is a feature of the original FireWide/IEEE 1394 specification allowing unrestricted access to PC’s physical memory for external FireWire devices. Direct Memory Access (DMA) is used to provide that access. As this is DMA, the exploit is going to work regardless of whether the target PC is locked or even logged on. There’s no way to protect a PC against this threat except explicitly disabling FireWire drivers.”

Obviously the encrypted volumes must be mounted at the time a memory dump is done or the PC goes to sleep to avoid the destruction of the decryption keys that allow access to content of encrypted volumes.

The forensic tool produced by Elcomsoft searches for the encryption keys in the memory dump then tries to extract them.

“The new product includes algorithms allowing us to analyze dumps of computers’ volatile memory, locating areas that contain the decryption keys. Sometimes the keys are discovered by analyzing byte sequences, and sometimes by examining crypto containers’ internal structures. When searching for PGP keys, the user can significantly speed up the process if the exact encryption algorithm is known.”

Resuming, the attack works when the computer is switched on, once it is turned off the RAM content is lost, keys included.

Elcomsoft tool automates the process of decryption keys retrieving from dump, the process is already used by forensics analysts but ignored by IT community.

The tool allows a complete decryption and On-the-Fly Access once retrieved the decryption keys from the dump. The blog post reports that Elcomsoft Forensic Disk Decryptor implemets two mechanisms to unlock protected containers:

  1. In complete decryption mode, the product will decrypt everything stored in the container, including any hidden volumes. This mode is useful for collecting the most evidence, time permitting.
  2. In real-time access mode, Elcomsoft Forensic Disk Decryptor mounts encrypted containers as drive letters, enabling quick random access to encrypted data. In this mode files are decrypted on-the-fly at the time they are read from the disk. Real-time access comes handy when investigators are short on time (which is almost always the case). In forensics investigation the ability to mount encrypted disks as a drive letter and accessing directly to data could appears not secure and may not be allowed by some policies but as described in the post “sometimes the speed and convenience is everything. When you don’t have the time to spend hours decrypting the entire crypto container, simply mount the disk and run your analysis tools for quick results!”

The Tool is definitely interesting, especially for those who carry out forensic investigations by automating analysis processes … and it is cheap, characteristics appreciated in times of crisis

 

About chainsoff.

Intelligence Media Service, Monitors and Analyzes Extremists’ activities, including and not limited to: The Muslim Brotherhood, Kurdish Terrorism, Syrian Politics, Jabhet Al-Nusra, Hezbollah, Cyber Crime, and Taliban activities in Syria. Well known for her deep knowledge on Terrorism. Open Source Exploitation expert in the discovery, collection, and assessment of foreign-based publicly available information, also known as Open Source Intelligence (OSINT), HIMNT
This entry was posted in Uncategorized. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s