Saturday , January 4 2025
BitLocker Encryption

Memory-Dump-UEFI
Researcher dumping memory to bypass BitLocker on Windows 11

Researchers have demonstrated a method to bypass Windows 11’s BitLocker encryption, enabling the extraction of Full Volume Encryption Keys (FVEKs) from memory.

This vulnerability underscores the risks associated with physical access attacks and highlights potential weaknesses in memory protection mechanisms.

3.3 Million Email Server Expose User Passwords and Messages in Plain Text

Around 3.3 million servers are running POP3/IMAP email services without encryption (TLS) enabled, the Shadowserver Foundation, a nonprofit security organization,...
Read More
3.3 Million Email Server Expose User Passwords and Messages in Plain Text

Memory-Dump-UEFI
Researcher dumping memory to bypass BitLocker on Windows 11

Researchers have demonstrated a method to bypass Windows 11’s BitLocker encryption, enabling the extraction of Full Volume Encryption Keys (FVEKs)...
Read More
Memory-Dump-UEFI  Researcher dumping memory to bypass BitLocker on Windows 11

CVE-2024-49112
PoC Exploit Released for Zero-Click vulnerability in Windows

SafeBreach Labs revealed a zero-click vulnerability in the Windows Lightweight Directory Access Protocol (LDAP) service, dubbed “LDAP Nightmare”. This critical...
Read More
CVE-2024-49112  PoC Exploit Released for Zero-Click vulnerability in Windows

Financial Threat Assessment 2024
BCSI marks Bangladeshi 28 banks high, 10 medium for cyber attack

Bangladesh Cyber Security Intelligence (BCSI) has published Financial Threat Assessment report for 2024. In an era where financial institutions and...
Read More
Financial Threat Assessment 2024  BCSI marks Bangladeshi 28 banks high, 10 medium for cyber attack

Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster

Cybersecurity researchers have uncovered three security weaknesses in Microsoft's Azure Data Factory Apache Airflow integration that, if successfully exploited, could...
Read More
Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster

US Treasury says it was hacked by China via third party: Beijing denies

The US Treasury Department said on Monday that Chinese-linked hackers were able to gain access to ‘unclassified documents’ after compromising...
Read More
US Treasury says it was hacked by China via third party: Beijing denies

PoC Exploited Released for Oracle Weblogic Server Vul

Security researchers have warned that a Proof-of-Concept (PoC) exploit has been publicly released for a critical vulnerability affecting Oracle WebLogic...
Read More
PoC Exploited Released for Oracle Weblogic Server Vul

Microsoft warn dev urgently to update .NET installer link

Microsoft is forcing .NET developers to quickly update their apps and developer pipelines so they do not use 'azureedge.net' domains...
Read More
Microsoft warn dev urgently to update .NET installer link

Look back; The Worst Hacks of 2024

In 2024, digital security experienced major breaches as cybercriminals and state-backed groups exploited vulnerabilities for large-scale attacks. These incidents were...
Read More
Look back; The Worst Hacks of 2024

HIPAA to be updated with new cybersecurity regulations, White House

Proposed new cybersecurity rules for healthcare institutions will focus on how they protect user data under HIPAA, as stated by...
Read More
HIPAA to be updated with new cybersecurity regulations, White House

The attack revolves around capturing the contents of a computer’s RAM during operation.

If an attacker has physical access to a device, they can abruptly restart it and dump the memory to extract sensitive information, including FVEKs.

This process leverages the fact that encryption keys are temporarily stored in memory while the system is running.

However, the technique is not foolproof. RAM contents degrade rapidly when power is cut off, making it crucial to minimize downtime.

To mitigate this degradation, researchers said that attackers could use methods such as physically cooling the RAM or maintaining power delivery using external sources.

In one demonstration, the attacker shorted the reset pins on the motherboard to restart the system without cutting power, preserving memory integrity.

Secure Boot, a security standard designed to prevent unauthorized software from running during startup, presents another layer of protection.

However, it has known vulnerabilities and can be bypassed using techniques such as shims or other exploits. These methods allow attackers to load custom tools for memory analysis.

1. Create a Bootable USB Device: A USB drive larger than the target system’s RAM is prepared with specialized software to extract memory dumps.

2. Abruptly Restart the Target System: The system is restarted at a critical moment—such as during Windows loading but before reaching the login screen—to capture encryption keys in memory.

3. Boot from USB: The attacker boots into a custom UEFI shell from the USB device and executes tools to dump memory contents.

4. Analyze Memory Dumps: The dumped data is analyzed using tools like `xxd` and `searchMem` to locate cryptographic keys stored in specific memory pools.

Key Recovery:

The FVEK key was found under specific Windows kernel memory pool tags, such as `dFVE`, which corresponds to BitLocker’s crash dump filter module (`dumpfve.sys`).

This tag consistently revealed encryption keys prefaced by metadata indicating the encryption algorithm used (e.g., XTS-AES-128).

This vulnerability demonstrates that even advanced encryption systems like BitLocker are not immune to physical access attacks.

While Microsoft employs techniques like key destruction during shutdown, residual keys remain in memory under certain conditions.

To mitigate risks:

Users should enable hardware-based security features like Trusted Platform Module (TPM).
Organizations should implement physical security measures to prevent unauthorized access.
Microsoft may need to enhance key management practices to reduce exposure in volatile memory.

This discovery serves as a reminder that no security system is entirely foolproof, particularly when physical access is involved

Check Also

82 GB

Hacker reportedly leak Indonesia Gov.t 82 GB data

Hackers claimed to have accessed and stolen 82 GB of sensitive data from Indonesia’s Regional …

Leave a Reply

Your email address will not be published. Required fields are marked *