A new Cold Boot Attack version lets attackers steal valuable data
IT experts discovered a new variant of the Cold Boot Attack that can let steal passwords, sensitive information, and even encryption keys from the computer. This type of method is considered to work on almost every modern machine you can find, even if the disk space has reached its limit.
Overall, cold boot attacks which are active for ten years is a way for attackers to steal important information that is located in RAM after the computer is shut down. Researcher group TCG (Trusted Computing Group) that consists of engineers from IBM, Hewlett-Packard, Intel, Microsoft, and AMD implemented a safeguard which would overwrite RAM as soon as a computer is turned back on. The technique is known as Reset Attack Mitigation or MORLock.
Cold boot attacks are used for encryption key obtainment
MORLock thought to be effective for a while; however, researchers from F-secure discovered a way to manipulate the safeguard which allows hackers to regain sensitive details on the computer after a cold reboot in a few minutes time duration. If the attacker manages to break through, numerous important information can come to a risk of exposure:
Cold boot attacks are a known method of obtaining encryption keys from devices. But the reality is that attackers can get their hands on all kinds of information using these attacks. Passwords, credentials to corporate networks, and any data stored on the machine are at risk.
IT experts explained that it is possible to enable the booting using external devices. Rewriting the memory chip and disabling it. Moreover, the traditional and new boot attacks have a thing in common – both of them need physical access to reach their target.
Apple's T2 Chip helps to avoid dangerous attacks
Apple claimed that Mac devices have an Apple T2 Chip which is a precautionary measure against such dangerous attacks. However, it seems that not all Mac computers have this chip. For those machines that do not have it, Apple recommended users to create a password for the firmware to increase the security level.
However, IT researchers from F-secure claim that it is also up to the manufacturers of the computers to strengthen their security system that would prevent cold boot attacks. Sadly, this is not a very easy goal to achieve which might take some time:
When you think about all the different computers from all the different companies and combine that with the challenges of convincing people to update, it’s a really difficult problem to solve easily. It will take the kind of coordinated industry response that doesn’t happen overnight, explains Olle from F-secure.
Prevent websites, ISP, and other parties from tracking you
To stay completely anonymous and prevent the ISP and the government from spying on you, you should employ Private Internet Access VPN. It will allow you to connect to the internet while being completely anonymous by encrypting all information, prevent trackers, ads, as well as malicious content. Most importantly, you will stop the illegal surveillance activities that NSA and other governmental institutions are performing behind your back.
Recover your lost files quickly
Unforeseen circumstances can happen at any time while using the computer: it can turn off due to a power cut, a Blue Screen of Death (BSoD) can occur, or random Windows updates can the machine when you went away for a few minutes. As a result, your schoolwork, important documents, and other data might be lost. To recover lost files, you can use Data Recovery Pro – it searches through copies of files that are still available on your hard drive and retrieves them quickly.