Cold-Boot Attack Steals Passwords In Under Two Minutes

0
0


Relying on computer memory’s remanence behavior, security researchers figured out a way to extract sensitive data from RAM, such as encryption keys, even after the loss of power.

Known for its volatility in data retention when out of power, RAM (Random Access Memory) can preserve information for a longer time – even minutes, under low-temperature conditions.

Early protection against cold-boot attacks

The first cold-boot attack was developed a decade ago. This type of side-channel compromise require physical access to the computer and this makes it practical against high-value targets rather than regular users. Even so, computer makers have implemented safeguards against it.

NordVPN

Trusted Computing Group, a consortium formed by AMD, Hewlett-Packard, IBM, Intel, and Microsoft, decided to protect computers against this threat vector by overwriting RAM contents when the power came back.

The specification is called TCG Reset Attack Mitigation or MORLock (Memory Overwrite Request Control).

This way, all information in memory would disappear when the system booted, even if the attacker acted sufficiently quick to create the low-temperature conditions necessary to maintain the data in memory.

Game over for MorLock

Security researchers Olle Segerdahl and Pasi Saarinen of F-Secure found a way to reprogram the non-volatile part of the memory chip that stores the overwrite instruction; thus, they were able to disable this action and enable booting from an external device (USB stick) to extract and analyze the data available in RAM.

Their attack works on computers in sleep mode, since shut down and hibernation actions cut off the power, and cause the residual memory to quickly degrade beyond recovery.

When in sleep mode, the computer state is saved in RAM, which runs in a minimum power state to hold the data.

Two minutes is more than enough to get the passwords

The two researchers demonstrated the new cold-boot attack in a video, showing that a prepared adversary can execute the attack in less than two minutes:

The critical interval is between powering down the machine and starting it again. Freezing the RAM chips, though, helps preserve the data during this time, allowing booting into a live operating system from a USB stick.

The technique can steal the data in the computer memory, including hard drive encryption keys.

In the case of BitLocker, if it is configured for pre-boot authentication with a PIN, the attack has only one shot to be successful because the code is mandatory for extracting the encryption keys into the RAM.

The researchers say that their attack is reliable on Windows machines that are already running or do not require a PIN.

“It’s not exactly easy to do, but it’s not a hard enough issue to find and exploit for us to ignore the probability that some attackers have already figured this out,” says Olle Segerdahl.

He added that it is not practical on easy targets, but it would be on an attacker’s list of options for a “bigger phish, like a bank or large enterprise.”

Defending against the attack

The top recommendation from the experts is to configure laptops to shut down or hibernate instead of entering sleep mode. Mixing pre-boot authentication in makes the defense even stronger.

To protect its users, Microsoft updated their documentation on Bitlocker, which now warns that the MOR bit implementation is not resilient to physical attacks. A full set of countermeasures is available here.

Apple responded by pointing to the latest generation of Macs, which have the T2 chip that do the encryption separately from the CPU and makes such an attack more difficult to execute.

The two researchers presented the attack today at SEC-T security conference, where they explained the technical details and methods to bypass security implementations, such as booting a USB stick on systems that have Secure Boot enabled.

The interview starts at 8h16m20s:

 



Source link