Instant messaging apps have become the de-facto standard of real-time, text-based communications. The acquisition of instant messaging chats and communication histories can be extremely important for an investigation. In this article, we compare the five top instant messaging apps for iOS in the context of their forensic analysis.
Speaking of iOS, there are several methods to acquiring communications going through an instant messaging app. The MITM (man-in-the-middle) attack is practically out of the question for most modern instant messaging apps; if there are exceptions, we aren’t aware of those. Even on Android devices, a MITM attack would require installing a third-party SSL certificate, and even that may not work for some instant messengers.
The ability to obtain communication histories from the vendor is a great tool in the hands of the law enforcement. The policies of different vendors vary greatly from near-instant full disclosure to flat non-disclosure with stops in between. We’ll discuss it in detail for each of the messaging apps.
Cloud extraction may be possible from several sources, which include iCloud synchronized data (including end-to-end encrypted data), iCloud backups and stand-alone backups in iCloud Drive. It’s up to the vendor to decide where and how to store the data; more on that later.
Finally, the data can be extracted from the iPhone device itself. For some messaging apps, logical extraction via iTunes-style backups is enough, while some other messengers don’t store anything in local backups. Imaging the file system (and, in some cases, decrypting the keychain) is always enough to gain full access to conversation histories.
So let us see the different extraction options available for the five top instant messaging apps for iOS.
iMessage is preinstalled on every iPhone and iPad. Being a pre-installed app, iMessage benefits from the huge user base of the entire Apple ecosystem. Based on the information shared by Apple, iMessage is estimated to have about 1.6 billion active users worldwide, which is largely be based on the number of iPhone users. Back in 2016, the service handled some 200,000 iMessages per second.
iMessage Verdict
The acquisition of the user’s iMessage communications is possible but tricky because of the multiple ‘ifs’ and ‘buts’. iMessage conversations can be extracted from multiple sources, the exact list of which, however, depends on the user’s configuration.
Tools required: Elcomsoft iOS Forensic Toolkit (file system) or Elcomsoft Phone Breaker (iCloud, iCloud backups, iTunes backups); Elcomsoft Phone Viewer (viewing and analyzing).
Walkthrough: Messages in iCloud: How to Extract Full Content Including Media Files, Locations and Documents, iMessage Security, Encryption and Attachments.
With more than 2.24 billion users worldwide, WhatsApp is one of the most popular (if not the most popular) instant messengers worldwide. While WhatsApp communication is based on the Signal protocol employing end-to-end encryption, that fact alone does not make WhatsApp any more secure than other messaging apps as WhatsApp keeps a backup of its conversation histories, making them easily accessible with several acquisition techniques.
WhatsApp Verdict
The acquisition of the user’s WhatsApp communications is easier than average. WhatsApp conversations can be extracted from nearly every available source including local and cloud backups.
Tools required: Elcomsoft iOS Forensic Toolkit and Elcomsoft Phone Viewer; or Elcomsoft Explorer for WhatsApp.
Walkthrough: Extract and Decrypt WhatsApp Backups from iCloud.
Telegram offers one of the most advanced cross-platform messaging experiences in the world of instant messengers. Offering apps for nearly every platform imaginable, Telegram can be used on multiple mobile devices and desktop computers. Unlike the strictly single-client WhatsApp, Telegram users can sign in on multiple devices at the same time. In 2018, Telegram reached 200 million monthly active users with nearly 300 million messages delivered daily.
Telegram uses a cloud service to deliver, store and synchronize messages. The service offers privacy conscious users the option to chat privately with the option called ‘secret chats’. Secret chats, unlike regular conversations, are never stored on Telegram servers.
Telegram Verdict
We consider the complexity of Telegram acquisition to be about average. Telegram conversations (including secret chats) can be extracted from iOS file system images. Regular chats can be obtained with a legal request from Telegram, although the company can be picky about those at least in some jurisdictions.
Tools required: Elcomsoft iOS Forensic Toolkit (to extract the file system); Elcomsoft Phone Viewer (to analyze the Telegram database).
Walkthrough: How To Extract Telegram Secret Chats from the iPhone
Judging by sheer numbers, Signal does not appear to be popular or widespread. However, this instant messenger was developed and marketed as the tool offering the ultimate privacy and security of communications. Barely reaching half a million users, Signal had already become the de-facto communication choice by those who have something to hide.
Signal implements a highly secure communication protocol employing end-to-end encryption. Unlike WhatsApp, which is based on the same protocol, Signal’s implementation is a lot more secure. Signal encrypts messages in transit and does not store conversation histories on its servers. Moreover, Signal encrypts its working databases, making acquisition difficult even if one has access to the physical device.
Signal Verdict
Signal is one of the more difficult messengers to acquire. The only way to extract Signal conversations requires extracting the file system images and decrypting the keychain. Logical, cloud and legal requests are useless.
Tools required: Elcomsoft iOS Forensic Toolkit (to extract the file system and decrypt the keychain); Elcomsoft Phone Viewer (to decrypt and analyze the Signal database).
Walkthrough: How to Extract and Decrypt Signal Conversation History from the iPhone
Skype is one of the oldest instant messaging apps around. The Microsoft owned instant messaging service has apps for most popular platforms. In March 2020, Skype is used by 100 million people on a monthly basis. Some 40 million people use it daily. Microsoft retains Skype conversation histories on its servers. Offering no ‘private’ or ‘secret’ communication options and readily cooperating with local governments, Microsoft delivers the most law enforcement friendly service of them all.
Skype Verdict
We consider the complexity of Skype acquisition to be about average. Skype does not have ‘secret’ chats, nor does it use end-to-end encryption of its database. Skype conversations can be extracted from iOS file system images. Microsoft readily cooperates with the law enforcement, allowing to obtain Skype communications via legal requests. In addition, Skype communications can be extracted from the cloud by authenticating as a user.
Tools required: Elcomsoft Phone Breaker (Microsoft Account); Elcomsoft Phone Viewer (to view the data).
Walkthrough: Extracting Skype Histories and Deleted Files Metadata from Microsoft Account
There are many more instant messengers around than we can deal in a single article. Line, Viber, QQ, WeChat, Facebook Messenger and many more other messaging apps are available for various platforms. We’ll continue our research, gradually adding support for additional communication tools.
Extract critical evidence from Apple iOS devices in real time. Gain access to phone secrets including passwords and encryption keys, and decrypt the file system image with or without the original passcode. Physical and logical acquisition options for all 64-bit devices running all versions of iOS.
Elcomsoft iOS Forensic Toolkit official web page & downloads »
Gain full access to information stored in FileVault 2 containers, iOS, Apple iCloud and Windows Phone devices! Download device backups from Apple iCloud and Microsoft OneDrive servers. Use Apple ID and password or extract binary authentication tokens from computers, hard drives and forensic disk images to download iCloud data without a password. Decrypt iOS backups with GPU-accelerated password recovery.
Elcomsoft Phone Viewer is a fast, lightweight forensic viewer for quickly accessing information extracted from mobile backups. Supporting a variety of platforms and data formats, the tool can display information extracted from local and cloud iOS backups and Microsoft Accounts. Password-protected iTunes backups can be automatically decrypted and analyzed without using third-party tools.
Elcomsoft Explorer for WhatsApp is a tool to download, decrypt and display WhatsApp communication histories. The tool automatically acquires WhatsApp databases from one or multiple sources, processes information and displays contacts, messages, call history and pictures sent and received. The built-in viewer offers convenient searching and filtering, and allows viewing multiple WhatsApp databases extracted from various sources.
Elcomsoft Explorer for WhatsApp official web page & downloads »