Articles About Us

23 December, 2019 | Mashable -

Company Says It Can Extract Email Addresses, Passwords From Locked iPhones

Elcomsoft, which creates digital forensic software for governments and law enforcement agencies, said on Friday that its iOS Forensic Toolkit can now extract some data from locked iPhones and iPads in Before First Unlock (BFU) mode.

21 December, 2019 | Hothardware -

Locked iPhones On iOS 13.3 Uncrackable? Guess Again, Elcomsoft’s Tool Gets At Data

A company that develops digital forensics tools for businesses and law enforcement specialists has found a way to hack into locked Apple iPhone devices running the latest version of iOS. The method is said to work on most iPhone models, from the iPhone 5s through the iPhone X, and is effective on iOS 12 through iOS 13.3.

21 December, 2019 | Forbes -

New Apple iOS 13.3 Security Threat: User Passwords ‘Extracted From Locked Devices’

Russian cybersecurity firm Elcomsoft, which provides forensic data extraction tools for security and law enforcement agencies is making headlines today (December 21) with a claim that one of its updated tools can now “extract select keychain records” from iPhones in their most secure state.

20 December, 2019 | -

5 Things to Know About the iOS 13.3.1 Update

Security company Elcomsoft has also discovered an exploit present in iOS 12-iOS 13.3 that allows people to extract email user names and passwords from locked iPhones. Don’t be surprised if iOS 13.3.1 patches this issue up.

20 December, 2019 | AppleInsider -

Elcomsoft tool can seize partial keychain from locked iPhones on iOS 13.3

Forensic software developer Elcomsoft has updated its toolset for iOS to enable the extraction of Keychain elements from iPhones running iOS 12 to iOS 13.3, with the ability to acquire partial Keychain data from disabled and locked iPhones that have yet to be unlocked after being turned on.

20 December, 2019 | Mashviral -

Locked iPhones still offer access to email references and more

Elcomsoft, a company that sells tools to law enforcement agencies to access locked iPhones, says it is now able to extract some data from devices with any version of iOS from 12.0 to 13.3. [...] The company has discovered that certain parts of data were already available on iOS devices before the first unlocking. Elcomsoft discovered that some keychain data is accessible even at this stage.

20 December, 2019 | -

Email usernames and passwords can be extracted from locked iPhones on iOS 13.3

Elcomsoft, a company which sells tools to law enforcement agencies to access locked iPhones, says that it is now able to extract some data from devices running any version of iOS from 12.0 to 13.3.

4 December, 2019 | PiunikaWeb -

checkra1n opens up new window to iOS forensics, but passcode recovery not yet possible

What if a forensic expert gets a locked iPhone from a crime scene? Yeah, details should be drawn out from the device to throw light on the misdeed. But with the Cupertino company patching up the vulnerabilities with each firmware overhaul, intruding into the OS is a bit far-fetched. Wait what! Elcomsoft, a mobile forensic tools developing company has found a way...

2 December, 2019 | MacTech -

Elcomsoft has updated iOS Forensic Toolkit, its mobile forensic tool for extracting data from a range of Apple devices. Version 5.20 adds the ability to extract the file system and decrypt the keychain from select Apple devices running all versions of iOS from iOS 12 to iOS 13.3.

9 January, 2019 | iLounge -

Elcomsoft forensic tools can now extract Apple Health data from iCloud

For forensic investigators, access to Health data can provide additional useful evidence, including records of heart rate, sleeping habits, location points, workouts, steps, and walking routines.