192
Windows 11 BitLocker Bypassed to Extract Encryption Keys
(gbhackers.com)
c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.
THE RULES
Instance Rules
Community Rules
If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.
Learn about hacking
Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub
Notable mention to !cybersecuritymemes@lemmy.world
This exploit requires physical access, and if you have physical access, anything is possible. Secure your shit better.
Bitlocker is designed to aid against phyiscal attacks, so physical access is a given.
the best you can ever do is make physical attacks more inconvenient, and it succeeds at that.
Here's another "critical vulnerability": the attacker can insert a physical device to intercept all keystrokes, and steal the key whenever the user enters it. A hidden camera can also accomplish this
Physical access to a running device, for clarity.
Edit: Unless you use a TPM with no pin/password, which is dumb.
It doesn't already have to be running. BitLocker retrieves its keys from TPM by default, so just booting a device will place the keys in memory.
You're misreading that, I'm afraid. Direct from the researcher:
"While Windows is loading" ... You must restart after the BitLocker password has been entered and the key is stored in RAM, that's how this exploit works. He had the best luck at that point durong boot, but it could be attempted at any time when RAM is powered and BitLocker is already unlocked. A shutdown or hibernated system is not vulnerable.
A lot of BitLocker setups unlock using just TPM though, which was my point. No password/PIN needs to be entered at boot time to unlock it, it uses the TPM to unlock. This is the default setup that many companies use. Password/PIN unlock is completely optional.
I'm not misreading that.
Not the default at any company I've been at. What's the point of encryption if it's unlocked right away? Whoever's doing that deserves this exploit. However, since that's factually correct I'll edit my original comment to add in:
Exactly.
I don't use BitLocker, but I do use FDE on Linux, and I use a password at the bootloader level. Why would I bother with all the downsides of FDE if it isn't actually secured by a password?
If the computer doesn't password protection and the attacker has physical access... They can just copy the data, why care about the keys?
I think that's already a worst case scenario.
The user still has to login to their user account. The assumption is that the Windows login is secure so BitLocker can decrypt using TPM and an attacker still won't have access to the data without being able to log in.
This article obviously shows a method how an attacker can potentially still get access to the data without logging in.