BFU Extraction Support From MSAB – Seeing Is Believing 

by Adam Firman, MSAB Tech Evangelist

Oh No, the Device Is in BFU: 

This is the common reaction; a device needs extracting, and you find it in a BFU state. According to other vendors, your options are now limited. Even if you do get an extraction, it will only acquire basic information. BFU means the data is encrypted and secured.  

Fear not, XRY and XRY Pro can still acquire a decrypted FFS or physical from a device in BFU – if it is supported, of course.  

Is this magic? Not at all. Vendors have advertised what is limited about their BFU extractions but that is not the case for every player in the industry. Unfortunately, this scenario is now leaving examiners with the conclusion that all BFU extractions only produce limited data. And that is simply not true. 

One thing that is often overlooked, especially when it comes to processing Android devices, is that not only should you consider the make of the device, but you should also consider the chipset of the device. Most exploits from vendors will be against a specific chipset. So, success or failure can be determined prior to commencing the extraction by doing your homework. 


Get The Latest DFIR News

Join the Forensic Focus newsletter for the best DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.

There Is Another Way, Enter XRY and XRY Pro

Troubled by an MTK device? MSAB has BFU support for those. Frustrated with a device containing a UNISOC chipset? You guessed it, we have BFU support for that too. We cover Samsung, LG, Motorola, OnePlus, Sony, Vivo, Xiaomi, Pixel, and Huawei plus others. Of course, it comes with the favourite caveat within the DFIR industry – it depends! Check your chipset, do your homework and you will be on the right track for a successful extraction. XRY Pro offers support for FDE, FBE and Secure Startup. 

But They Say It Will Only Produce Limited Results: 

Hopefully, this post will help alleviate fears of a limited extraction when you find a device in a BFU state. Terms such as FFS, AFU and BFU are accepted terminology for this industry; however, the output from each state is not.  

As we are all aware, this industry does not stand still, and as a vendor, MSAB must adapt our methods to help you continue to have access to the latest mobile devices. Here at MSAB we don’t want you to think that your case can’t be progressed, especially if your decision-making is based on a statement from another vendor. Always explore your options and your tools and exhaust all avenues before you place that mobile device back on the shelf unprocessed.  

There is a reason that it is recommended to have multiple tools. Validation, of course, is the most important motivation, but access to devices is another crucial factor.  

So, the next time you come across a device that is in BFU state, make sure that you double click on XRY. 

MSAB – your trusted partner in digital forensics. 

Terminology 

Term Definition 
AFU After first unlock. A state where the device has been unlocked at least one time since it was last turned on. 
BFU Before first unlock. A state where the device has rebooted or powered on and not been unlocked since the reboot/power on.  
DEK Data encryption key 
FBE File based encryption. Devices running Android 7 and higher can support file-based encryption whereby every different file is encrypted with a different key independently. Modern devices come with such encryption by default.  
FDE Full disk encryption, former encryption method for older Androids. 
Secure startup Secure startup protects the device by requiring a password or PIN each time the device is turned on 
FFS Full File System Extraction 

Leave a Comment

Latest Videos

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feeds settings page to add an API key after following these instructions.

Latest Articles