ElcomSoft Co. Ltd.: Real-time iCloud Forensics - Calls, Contacts, Notes, Calendars and Safari Activities
Elcomsoft Phone Creaker, the company's mobile acquisition tool. Version 6.30 gains the ability to extract information about the user's recent Web browsing activities, notes and calendars from the cloud. In contrast with cloud backups this information along with call logs and contacts is available with little or no delay, enabling near real-time access to essential user activity data.
"This is not backups," says Vladimir Katalov, ElcomSoft CEO. "Cloud backups are daily at best. We offer access to information such as Web browsing just minutes after the activity occurs."
Information such as call logs, contacts, notes, calendars as well as Web browsing activities including Safari history and open tabs can be synced with Apple servers. Unlike iCloud backups that may or may not be created on daily basis, synced information is pushed to Apple servers just minutes after the corresponding activity has taken place. Once uploaded, synced data can be retained for months with is no option for the end user to clear the data or disable the syncing.
A month ago, Elcomsoft Phone Breaker 6.20 provided the ability to download iPhone call logs and contacts synced with iCloud. Version 6.30 extends this ability by including notes, calendars and Web browsing activities, displaying Safari opened tabs and browsing history just minutes after the user visits follows a link.
Elcomsoft Phone Breaker 6.30
Elcomsoft Phone Breaker is a mobile forensic tool helping law enforcement specialists to extract information from offline and cloud backups created by Apple, BlackBerry and Windows devices. The update brings Web browsing activities call before the eyes of the law enforcement just minutes after the user opens a new tab or follows a Web link in Safari. Synced call logs, calendar events, notes and contacts are also downloaded.
The user's Apple ID and password or iCloud authentication token are required to extract data from the cloud. By using authentication tokens, forensic specialists can bypass two-factor authentication checks.