Wednesday , February 5 2025
BitLocker Encryption

Memory-Dump-UEFI
Researcher dumping memory to bypass BitLocker on Windows 11

Researchers have demonstrated a method to bypass Windows 11’s BitLocker encryption, enabling the extraction of Full Volume Encryption Keys (FVEKs) from memory.

This vulnerability underscores the risks associated with physical access attacks and highlights potential weaknesses in memory protection mechanisms.

Hackers To Use HTTP Client Tools To Compromise Microsoft 365 Accounts

Hackers are using HTTP client tools for advanced account takeover attacks on Microsoft 365. Seventy-eight percent of Microsoft 365 tenants...
Read More
Hackers To Use HTTP Client Tools To Compromise Microsoft 365 Accounts

Google patches 47 Android flaws, Including Actively Exploited CVE-2024-53104

Google has released patches for 47 security flaws in Android, including one that is actively being exploited. CVE-2024-53104 (CVSS score: 7.8)...
Read More
Google patches 47 Android flaws, Including Actively Exploited CVE-2024-53104

CVE-2025-21415
Microsoft Patches Critical Azure AI Face Service Vulnerability

Microsoft has released patches for two critical security flaws in Azure AI Face Service and Microsoft Account that could allow...
Read More
CVE-2025-21415  Microsoft Patches Critical Azure AI Face Service Vulnerability

Daily Security Update Dated:4.02.2025

Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so...
Read More
Daily Security Update Dated:4.02.2025

768 Exploited CVEs in 2024, a 20% Increase from 639 in 2023

In 2024, 768 vulnerabilities with CVE identifiers were reported as exploited in the wild, a 20% increase from 639 in...
Read More
768 Exploited CVEs in 2024, a 20% Increase from 639 in 2023

.Gov Domains Weaponized in Phishing Surge

A recent report from Cofense Intelligence highlights a concerning trend: threat actors are increasingly misusing .gov top-level domains (TLDs) to...
Read More
.Gov Domains Weaponized in Phishing Surge

RedSentry presents
Hacked 101 Seminar Successfully Ended at UITS

The cybersecurity seminar "RedSentry presents: Hacked 101," organized by RedSentry with the University of Information Technology and Sciences (UITS) as...
Read More
RedSentry presents  Hacked 101 Seminar Successfully Ended at UITS

US scientists claim to replicate DeepSeek for $30 dubbed “TinyZero,”

Researchers at the University of California, Berkeley, claims they’ve managed to reproduce the core technology behind DeepSeek’s at a total...
Read More
US scientists claim to replicate DeepSeek for $30 dubbed “TinyZero,”

ChatGPT, DeepSeek, Qwen 2.5-VL Vulnerable to AI Jailbreaks

This week, multiple research teams showcased jailbreaks for popular AI models, including OpenAI's ChatGPT, DeepSeek, and Alibaba's Qwen. After its...
Read More
ChatGPT, DeepSeek, Qwen 2.5-VL Vulnerable to AI Jailbreaks

Paragon Attack WhatsApp With New Zero-Click Spyware

WhatsApp reveiled on Friday that a "zero-click" spyware attack, linked to the Israeli company Paragon, has targeted many users globally,...
Read More
Paragon Attack WhatsApp With New Zero-Click Spyware

The attack revolves around capturing the contents of a computer’s RAM during operation.

If an attacker has physical access to a device, they can abruptly restart it and dump the memory to extract sensitive information, including FVEKs.

This process leverages the fact that encryption keys are temporarily stored in memory while the system is running.

However, the technique is not foolproof. RAM contents degrade rapidly when power is cut off, making it crucial to minimize downtime.

To mitigate this degradation, researchers said that attackers could use methods such as physically cooling the RAM or maintaining power delivery using external sources.

In one demonstration, the attacker shorted the reset pins on the motherboard to restart the system without cutting power, preserving memory integrity.

Secure Boot, a security standard designed to prevent unauthorized software from running during startup, presents another layer of protection.

However, it has known vulnerabilities and can be bypassed using techniques such as shims or other exploits. These methods allow attackers to load custom tools for memory analysis.

1. Create a Bootable USB Device: A USB drive larger than the target system’s RAM is prepared with specialized software to extract memory dumps.

2. Abruptly Restart the Target System: The system is restarted at a critical moment—such as during Windows loading but before reaching the login screen—to capture encryption keys in memory.

3. Boot from USB: The attacker boots into a custom UEFI shell from the USB device and executes tools to dump memory contents.

4. Analyze Memory Dumps: The dumped data is analyzed using tools like `xxd` and `searchMem` to locate cryptographic keys stored in specific memory pools.

Key Recovery:

The FVEK key was found under specific Windows kernel memory pool tags, such as `dFVE`, which corresponds to BitLocker’s crash dump filter module (`dumpfve.sys`).

This tag consistently revealed encryption keys prefaced by metadata indicating the encryption algorithm used (e.g., XTS-AES-128).

This vulnerability demonstrates that even advanced encryption systems like BitLocker are not immune to physical access attacks.

While Microsoft employs techniques like key destruction during shutdown, residual keys remain in memory under certain conditions.

To mitigate risks:

Users should enable hardware-based security features like Trusted Platform Module (TPM).
Organizations should implement physical security measures to prevent unauthorized access.
Microsoft may need to enhance key management practices to reduce exposure in volatile memory.

This discovery serves as a reminder that no security system is entirely foolproof, particularly when physical access is involved

Check Also

2023

768 Exploited CVEs in 2024, a 20% Increase from 639 in 2023

In 2024, 768 vulnerabilities with CVE identifiers were reported as exploited in the wild, a …

Leave a Reply

Your email address will not be published. Required fields are marked *