this post was submitted on 06 Jan 2025
190 points (99.5% liked)

Cybersecurity

5930 readers
400 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 2 years ago
MODERATORS
 

An attacker with physical access can abruptly restart the device and dump RAM, as analysis of this memory may reveal FVEK keys from recently running Windows instances, compromising data encryption.

The effectiveness of this attack is, however, limited because the data stored in RAM degrades rapidly after the power is cut off.

you are viewing a single comment's thread
view the rest of the comments
[–] Limonene 22 points 5 days ago (9 children)

A "cold boot" attack. These have been around for a while.

The degredation is not a huge barrier. Spraying inverted canned air can cool the DRAM enough to preserve it for a little while, even long enough to switch it to a new motherboard. Whenever the motherboard is powered, the DRAM is being refreshed, so won't degrade. A few bits lost is no fatal flaw, since most cold boot attack algorithms search for long key schedules, not just the key.

Bitlocker is extra vulberable because it stores the key in the TPM and requires no password to boot. An attacker can extract the key even if the computer is off when they get it.

[–] [email protected] 9 points 5 days ago* (last edited 5 days ago) (3 children)

What's the advantage of disk encryption if you don't require a password to boot? Couldn't you just boot the device and extract the data using Explorer anyway?

[–] Limonene 4 points 5 days ago (1 children)

I assume they think the Windows login password will keep them safe. I don't know. But many corporate computers (several I've been forced to use) do use Bitlocker without a password.

[–] [email protected] 2 points 4 days ago

Yeah, that's only going to protect from drive theft, which I guess makes disposal easier?

load more comments (1 replies)
load more comments (6 replies)