Tuesday, March 19, 2024
-Advertisement-
Reimagining Public Sector Analytics
Reimagining Public Sector Analytics
HomeNewsCyber SecurityCybersecurity researchers warn Intel, Microsoft and Apple about weakness in modern computers that exposes encryption keys

Cybersecurity researchers warn Intel, Microsoft and Apple about weakness in modern computers that exposes encryption keys

Follow Tech Observer on Google News

Consultants from cybersecurity firm F-Secure have discovered a weakness in modern computers that attackers can use to steal encryption keys and other sensitive information.

Google News

Consultants from firm have discovered a weakness in modern computers that attackers can use to steal encryption keys and other sensitive information. The discovery has compelled the researchers to warn PC vendors like , and users that current security measures are not enough to protect data in lost or stolen laptops said a statement from cybersecurity firm.

Attackers need physical access to the computer before they can exploit the weakness. But F-Secure Principal Security Consultant Olle Segerdahl says once achieved, an adversary can successfully perform the attack in about 5 minutes. The weakness allows attackers with physical access to a computer to perform a cold boot attack – an attack that's been known to hackers since 2008. Cold boot attacks involve rebooting a computer without following a proper shutdown process, then recovering data that remains briefly accessible in the RAM after the power is lost.

“Typically, organizations aren't prepared to protect themselves from an attacker that has physical possession of a company computer. And when you have a security issue found in devices from major PC vendors, like the weakness my team has learned to exploit, you need to assume that a lot of companies have a weak link in their security that they're not fully aware of or prepared to deal with,” said Segerdahl.

Modern laptops now overwrite RAM specifically to prevent attackers from using cold boot attacks to steal data. However, Segerdahl and his team discovered a way to disable the overwrite process and re-enable the decade-old cold boot attack.

“It takes some extra steps compared to the classic cold boot attack, but it's effective against all the modern laptops they've tested. And since this type of threat is primarily relevant in scenarios where devices are stolen or illicitly obtained, it's the kind of thing an attacker will have plenty of time to execute,” explained Segerdahl.

The attack exploits the fact that the firmware settings governing the behavior of the boot process are not protected against manipulation by a physical attacker. Using a simple hardware tool, an attacker can rewrite the non-volatile memory chip that contains these settings, disable memory overwriting, and enable booting from external devices. The cold boot attack can then be carried out by booting a special program off a USB stick.

“Because this attack works against the kind of laptops used by companies there's no reliable way for organizations to know their data is safe if a computer goes missing. And since 99 percent of company laptops will contain things like access credentials for corporate networks, it gives attackers a consistent, reliable way to compromise corporate targets,” said Segerdahl. “There's no easy fix for this issue either, so it's a risk that companies are going to have to address on their own.”

Segerdahl has shared his team's research with Intel, Microsoft and Apple to help the PC industry improve the security of current and future products. Because Segerdahl doesn't expect an immediate fix from the industry anytime soon, he recommends companies prepare themselves for these attacks. One way is to configure laptops to automatically shut down/hibernate instead of entering sleep mode and require users to enter the BitLocker PIN anytime Windows boots up or restores. Educating workers, especially executives and employees who travel, about cold boot attacks and similar threats is also important. And IT departments should have an incident response plan ready to deal with laptops that go missing.

“A quick response that invalidates access credentials will make stolen laptops less valuable to attackers. IT security and incident response teams should rehearse this scenario and make sure that the company's workforce knows to notify IT immediately if a device is lost or stolen,” advises Segerdahl. “Planning for these events is a better practice than assuming devices cannot be physically compromised by hackers because that's obviously not the case.”

Get the day's headlines from Tech Observer straight in your inbox

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
Sanjay Singh
Sanjay Singh
Sanjay Singh covers startups, consumer electronics and telecom for TechObserver.in
- Advertisement -
Reimagining Public Sector Analytics
Reimagining Public Sector Analytics
- Advertisement -Veeam
- Advertisement -Reimagining Public Sector Analytics
- Advertisement -ESDS SAP Hana

Subscribe to our Newsletter

83000+ Industry Leaders read it everyday

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
- Advertisement -

Cisco completes acquisition of cybersecurity firm Splunk for $28 billion

The acquisition, valued at approximately $28 billion, one of the largest in Cisco's history, signifies a strategic move to strengthen its software portfolio amidst the growing interest in artificial intelligence technologies. 

RELATED ARTICLES