Elcomsoft Explorer for WhatsApp Use Jailbreak to Decrypts WhatsApp Cloud Backups


Posted December 27, 2018 by elcomsoft

Elcomsoft Explorer for WhatsApp 2.60 offers forensic experts the ability to decrypt WhatsApp conversations from stand-alone WhatsApp backups made on iPhone devices and retrieved from iCloud Drive.
 
ElcomSoft Co. Ltd. updates Elcomsoft Explorer for WhatsApp, an all-in-one tool for easy acquisition and analysis of WhatsApp communication histories. Version 2.60 gains the ability to decrypt backups from Cloud Drive using device keychain. In addition, Elcomsoft Explorer for WhatsApp now supports HEIC (HEIF) images.

Elcomsoft Explorer for WhatsApp 2.60 adds the ability to decrypt WhatsApp conversations from stand-alone WhatsApp backups made on iPhone devices and retrieved from iCloud Drive. The new decryption method does not require a WhatsApp activation code.

Elcomsoft Explorer for WhatsApp 2.60 is an incremental update, adding the ability to decrypt stand-alone WhatsApp backups downloaded from iCloud Drive without receiving an activation code from WhatsApp. In previous versions, EXWA required access to the user's verified phone number (SIM card) to obtain the encryption key and decrypt the backup. The new release offers the ability to decrypt downloaded backups by using a copy of the iPhone keychain extracted from a jailbroken device.

The new decryption methods makes use of the encryption key stored on the iPhone in the keychain. While most keychain items are accessible via logical acquisition, WhatsApp targets a higher security class and can be only obtained with iOS Forensic Toolkit 4.0 via physical keychain extraction. A jailbreak is required in order to access the keychain. This key can be used to decrypt the backup in place of the code received from WhatsApp servers.

The new decryption method is optional, and offers tangible benefits over the previously used (and still available) decryption method. The expert will no longer require to obtain the security code from WhatsApp by SMS or phone call, and WhatsApp will remain active on the user's iPhone. If one does not have access to the user's SIM card and cannot receive the activation SMS, this could be the only extraction method available. The decryption key extracted from the user's keychain will work for all past and future WhatsApp backups made on that device.

Release notes:

- Added the ability to decrypt backups from Cloud Drive using device keychain
- Added support for HEIC (HEIF) images
- Added support for system messages
- Improved support for deleted messages
- Bug fixes and performance improvements

Elcomsoft Explorer for WhatsApp 2.60 is immediately available at https://www.elcomsoft.com/exwa.html
-- END ---
Share Facebook Twitter
Print Friendly and PDF DisclaimerReport Abuse
Contact Email [email protected]
Issued By Vladimir Katalov
Phone +7 495 974-1162
Business Address Zvezdnyi blvd. 21, office 615
na
Country Russian Federation
Categories Computers , Software
Tags decrypt whatsapp , read whatsapp , whatsapp
Last Updated December 27, 2018