'NAND mirroring' could let FBI break into iPhone without Apple's help, researchers say

Posted:
in General Discussion
Whether or not Cellebrite is involved, the FBI may be able to unlock the iPhone of San Bernardino shooter Syed Farook through a process known as "NAND mirroring," security researchers explained on Wednesday.

Image Credit: iFixit
Image Credit: iFixit


The technique involves removing NAND storage from a device, copying it using a chip reader, and then reattaching the original chip using a harness, Jonathan Zdziarski told Re/code. That way, investigators always have a fallback -- even in the case of Farook's phone, which is set to self-delete its data after hitting iOS 9's passcode retry limit.

Matthew Green, a cryptographer and assistant professor at the Johns Hopkins Information Security Institute, observed that while the process can circumvent encryption, it remains a dangerous approach. Investigators must de-solder a NAND chip to remove it, which runs the risk of doing damage and losing access entirely.

Farook's iPhone, a 5c, is one of the last iPhone models the technique could apply to, since anything with Touch ID -- and hence a Secure Enclave -- would theoretically be immune.

Zdziarski speculated that whoever is helping the FBI, the short two-week testing window requested by the U.S. Justice Department means the government is likely using an off-the-shelf unlock solution from a forensic firm.

Just one day before a review of the court order issued to Apple, the Justice Department asked to postpone the hearing, saying that "an outside party" had shared a possible method of cracking Farook's phone without asking Apple to build a passcode limit removal. Earlier today reports identified that party as Cellebrite, an Israeli forensics firm.
«13

Comments

  • Reply 1 of 51
    rezwitsrezwits Posts: 879member
    What about Error 53, when they try to put it back together tho?
    [Deleted User]melodyof1974
  • Reply 2 of 51
    This is what I was saying in one of my previous posts. Take out the hardware and access the data that way. 

    This was only partly about accessing that specific data however and yet mostly to do with setting a new benchmark for accessing private data via a "backdoor": 
  • Reply 3 of 51
    hmlongcohmlongco Posts: 537member
    rezwits said:
    What about Error 53, when they try to put it back together tho?
    They're not replacing the TouchID sensor, so np.

    ration altallest skilredgeminipa
  • Reply 4 of 51
    sog35 said:


    What the FBI wanted Apple to do was a software hack.  With software hacks you can access phones WITHOUT possession.  And with a backdoor you can access MILLIONS of phones at the same time. In your home. IN your bedroom. That is what I'm afraid of.


    Why does it matter to you if the FBI can access private data on suspicion of criminal actively ? Why are you "afraid" ?
    edited March 2016
  • Reply 5 of 51
    NemWanNemWan Posts: 118member
    sog35 said:


    What the FBI wanted Apple to do was a software hack.  With software hacks you can access phones WITHOUT possession.  And with a backdoor you can access MILLIONS of phones at the same time. In your home. IN your bedroom. That is what I'm afraid of.


    Why does it matter to you if the FBI can access private data on suspicion of criminal actively ? Why are you "afraid" ?
    The U.S. is not the only government with jurisdiction over iPhone users in the world. You can't pick which ones to secure it from.
    calitdknoxtallest skillostkiwiewtheckmanbadmonkredgeminipawaverboy
  • Reply 6 of 51
    NemWanNemWan Posts: 118member
    sog35 said:


    What the FBI wanted Apple to do was a software hack.  With software hacks you can access phones WITHOUT possession.  And with a backdoor you can access MILLIONS of phones at the same time. In your home. IN your bedroom. That is what I'm afraid of.


    Why does it matter to you if the FBI can access private data on suspicion of criminal actively ? Why are you "afraid" ?
    The U.S. is not the only government with jurisdiction over iPhone users in the world. You can't pick which ones to secure it from.
    snovacali
  • Reply 7 of 51
    snovasnova Posts: 1,281member
    sog35 said:


    What the FBI wanted Apple to do was a software hack.  With software hacks you can access phones WITHOUT possession.  And with a backdoor you can access MILLIONS of phones at the same time. In your home. IN your bedroom. That is what I'm afraid of.


    Why does it matter to you if the FBI can access private data on suspicion of criminal actively ? Why are you "afraid" ?
    You can't authenticate WHO is hacking into your phone. That's the challenge. 
    calitdknoxtallest skilewtheckmanredgeminipaurahara
  • Reply 8 of 51
    hmlongcohmlongco Posts: 537member

    sog35 said:
    This is the type of hacking I want to see.  Hardware hacks.  This means you need possession of the phone.
    The issue now becomes what constitutes "possession"? What if the police have your phone after an arrest? When you're brought in for questioning? During a routine traffic stop? What about a TSA or HS agent who detains you at an airport or border crossing?
    ration altdknoxtallest skilbadmonk
  • Reply 9 of 51
    gtrgtr Posts: 3,231member
    ...
    edited March 2016
  • Reply 10 of 51

    Well, that will get them something they can hack without erasing the data.
    They may still not be able to decrypt the data.  
    It may take a 100 years by which time ISIS will be long gone and the USS Enterprise will be running iOS for spaceships.

    I believe that Apple has hired some firmware security folks that may prevent this kind of hardware hacking in the future.

    Time will tell.
  • Reply 11 of 51
    bsimpsenbsimpsen Posts: 398member
    sog35 said:
    This is the type of hacking I want to see.  Hardware hacks.  This means you need possession of the phone.
    If Apple did the secure enclave correctly in the iPhone6/6s, it'll take something far more sophisticated than NAND mirroring to crack. They'll have to de-cap the chip and try to probe. And it's fairly easy to make a chip unprobe-able, so even that avenue can and will be cut off in the future. Uncrackable encryption is here to stay.
    lostkiwi
  • Reply 12 of 51
    pmzpmz Posts: 3,433member
    Can't wait to hear about the fake data they extract from the phone and the fake terror plot they are able to foil as a result.

    Lies, lies, bullshit, and more lies.
    lostkiwibadmonk
  • Reply 13 of 51
    calicali Posts: 3,494member
    sog35 said:


    What the FBI wanted Apple to do was a software hack.  With software hacks you can access phones WITHOUT possession.  And with a backdoor you can access MILLIONS of phones at the same time. In your home. IN your bedroom. That is what I'm afraid of.


    Why does it matter to you if the FBI can access private data on suspicion of criminal actively ? Why are you "afraid" ?
    Did you not comprehend his post?

    Someone in a bedroom. Meaning anyone can access your back door once it's created.
  • Reply 14 of 51
    radarthekatradarthekat Posts: 3,842moderator
    Would suck if the count has already been incremented to 9.  A clever terrorist could simply leave the phone in that state on the day he's about to go on his killing spree.  Then, the very first time the FBI tries a passcode, the phone proceeds to wipe itself.  All that work to copy the counter so that it could be reset, while assuming it's at zero, would go up in smoke.
    edited March 2016 jony0diplication
  • Reply 15 of 51
    Time to upgrade from the 5....
  • Reply 16 of 51
    crossladcrosslad Posts: 527member
    If this phone had been any later model than the 5c the FBI could have just used the terrorists  thumb to unlock the phone.
  • Reply 17 of 51
    Dude_Dude_ Posts: 3member

    Nicely written article that seems to omit the OBVIOUS. NAND mirroring only replaces the data on the phone. All of the security is located in the Processor, this according to Apple's documentation. So while you may be able to save the data after the try and wipe process, this process does nothing to restore the phone access functionally. From what I understand once the 10 try counter reaches 10 the phone will always wipe data from the phone even if a successful passkey is entered via the GUI. Restoring the phone access is what decrypts the data without knowing what the encryption key is. Altering the processor has its own hazards given that there are hash signed certificates that insure that only authorized and unaltered code is executed. Apple's security white paper states that the security features are stored in the boot ROM with keys burnt into the ROM at the factory. Much of this information is also stated in court documents provided by the FBI. Then there's the very simply question;    NAND mirroring is such a simple process that it boggles ones mind to think that the FBI hasn't thought of doing this given that the San Bernardino phone is not the first phone the FBI has that they can't unlock. BTW, court documents state that the iOS is 9, not 8, but the phone processor does not have a secure enclave. A secure enclave only makes the processor more secure, not the data on the NAND chip.

    The process that seems to be most viable is the delayering of the processor to expose the encryption key and the key itself might be encrypted. The problem; you get one shot. The FBI has also mentioned the Israeli firm Cellebrite, a well recognized firm that has developed software to hack other iphones without altering the phone in any way. The OS noted by the FBI in court documents is iOS4.




    fracjbishop1039redraider11lostkiwi
  • Reply 18 of 51
    CMA102DLCMA102DL Posts: 121member
    Dude_ said:

    Then there's the very simply question;    NAND mirroring is such a simple process that it boggles ones mind to think that the FBI hasn't thought of doing this given that the San Bernardino phone is not the first phone the FBI has that they can't unlock.

    Congressman Issa asked the same question to Comey about whether the FBI had tried this approach before arm twisting Apple. Comey came clean that mirroring had been suggested before. The FBI is just jumping on this after realizing that they simply cannot make a person or a company do something against their will. This is government bureaucracy 
  • Reply 19 of 51
    lkrupplkrupp Posts: 10,557member
    crosslad said:
    If this phone had been any later model than the 5c the FBI could have just used the terrorists  thumb to unlock the phone.
    Baloney. TouchID doesn’t work on dead tissue. All those scenarios about cutting fingers off are pure bullshit. But you read it on the Internet so it must be true, right?
    ration allostkiwi
  • Reply 20 of 51
    rob53rob53 Posts: 3,251member
    crosslad said:
    If this phone had been any later model than the 5c the FBI could have just used the terrorists  thumb to unlock the phone.
    Not necessarily. TouchID is supposed to only work with a live finger even though people supposedly have shown it work. Plus, you only get three attempts before it requires passcode. How many times have you messed up with a live finger? 
Sign In or Register to comment.