logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
7th September 2018 by CyberVision 0 Comments 905 Views
7th September 2018 by CyberVision in Business Security

Cold Boot Attacks rearing their ugly heads again  

 

An updated version of the Cold Boot Attack allows hackers to bypass security mechanisms and access data that remain in memory after a machine shuts down. Modern machines from Apple, Dell, Lenovo and other huge technical innovation companies are affected by this new threat.

 

Known since 2008, the Cold Boot Attack is not new. Attackers with physical access to a machine are able to steal the device’s encryption keys, which briefly remain in memory after a hard reboot. Most devices now protect against Cold Boot Attacks, but a recent discovery has left online users unsettled.

 

The principal security researcher at F-Secure, Olle Segerdahl and a fellow security consultant Pasi Saarinen, found this mechanism can be broken if the firmware is manipulated. The pair found a way to bypass a protection mechanism and exploit a weakness in the computer’s firmware to steal encryption keys and other data in a successful Cold Boot Attack.

 

Several types of data could potentially be at risk such as hard drive encryption keys stored in memory, passwords, network credentials and any information on the machine that its user can access.

 

The amount of time an attacker has to perform the operation depends on the machine they’re attempting to hack. If an attacker finds a machine in sleep mode, then the attacker has unlimited time. If no password is required to boot the machine, they can try multiple times to gain access.

 

F-Secure has informed Apple, Microsoft, and Intel of their findings. They are adamant in expressing that this technique requires physical access and it is imperative to implement using a device with a discreet Trusted Platform Module (TPM). The TPM will disable the sleep/hibernation mode on your devices and protect them from attacks like this.

 

 

 

 

 

 

 

 

 

 

 

 

 

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • cold boot attacks
  • f-secure
  • f-secure cyber security
  • hackers
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo