A new Cold Boot Attack version lets attackers steal valuable data
Attackers can steal various sensitive information, encryption keys, and passwords by using the new cold boot attack variant.
IT experts discovered a new variant of the Cold Boot Attack that can let steal passwords, sensitive information, and even encryption keys from the computer. This type of method is considered to work on almost every modern machine you can find, even if the disk space has reached its limit.
Overall, cold boot attacks which are active for ten years is a way for attackers to steal important information that is located in RAM after the computer is shut down. Researcher group TCG (Trusted Computing Group) that consists of engineers from IBM, Hewlett-Packard, Intel, Microsoft, and AMD implemented a safeguard which would overwrite RAM as soon as a computer is turned back on. The technique is known as Reset Attack Mitigation or MORLock.
Cold boot attacks are used for encryption key obtainment
MORLock thought to be effective for a while; however, researchers from F-secure discovered a way to manipulate the safeguard which allows hackers to regain sensitive details on the computer after a cold reboot in a few minutes time duration. If the attacker manages to break through, numerous important information can come to a risk of exposure:
Cold boot attacks are a known method of obtaining encryption keys from devices. But the reality is that attackers can get their hands on all kinds of information using these attacks. Passwords, credentials to corporate networks, and any data stored on the machine are at risk.
IT experts explained that it is possible to enable the booting using external devices. Rewriting the memory chip and disabling it. Moreover, the traditional and new boot attacks have a thing in common – both of them need physical access to reach their target.
Apple's T2 Chip helps to avoid dangerous attacks
Apple claimed that Mac devices have an Apple T2 Chip which is a precautionary measure against such dangerous attacks. However, it seems that not all Mac computers have this chip. For those machines that do not have it, Apple recommended users to create a password for the firmware to increase the security level.
However, IT researchers from F-secure claim that it is also up to the manufacturers of the computers to strengthen their security system that would prevent cold boot attacks. Sadly, this is not a very easy goal to achieve which might take some time:
When you think about all the different computers from all the different companies and combine that with the challenges of convincing people to update, it’s a really difficult problem to solve easily. It will take the kind of coordinated industry response that doesn’t happen overnight, explains Olle from F-secure.
- ^ Cold boot attack. Wikipedia. The free encyclopedia.
- ^ Catalin Cimpanu. New cold boot attack affects "nearly all modern computers". ZDNet. 24/7 news coverage, analysis, and trends.
- ^ Memory Overwrite Request Control (MOR) LOCK version 2. Microsoft. All about computers.
- ^ Adam Pilkey. The Chilling Reality of Cold Boot Attacks. F-secure. About cybersecurity.
- ^ Vadim Yuryev . Everything you need to know about Apple's T2 chip in the 2018 MacBook Pro. Appleinsider. News site.