Jump to content
  • Sign Up
×
×
  • Create New...

Hacker demonstrates the supposedly-patched Windows 11 BitLocker is still vulnerable to hackers — default encryption can be overcome with network access


Recommended Posts

  • Diamond Member

This is the hidden content, please

Hacker demonstrates the supposedly-patched Windows 11 BitLocker is still vulnerable to hackers — default encryption can be overcome with network access

This week at the Chaos Computer Club’s (CCC) annual Chaos Communication Congress, hacker Thomas Lambertz presented ‘Windows BitLocker: Screwed without a Screwdriver,’ detailing how users can beat BitLocker encryption and gain access to protected data. The old reported-fixed bug,

This is the hidden content, please
, can still be exploited on current versions of Windows with just one-time physical device access and a network connection. Still, the attack doesn’t require opening up the PC or having hours of access as with other drive decryption exploits [h/t
This is the hidden content, please
].

This attack falls into the category of “bitpixie” attacks that have been well-documented since mid-2022. While this specific error was technically fixed via updates in November 2022, this demonstrates that this fix is, unfortunately, only surface-level. By using Secure Boot to start an outdated Windows bootloader to extract the encryption key into memory and subsequently using Linux to retrieve the contents of memory and find that BitLocker key, the updated version of Windows 11 can still effectively be attacked as if it were never updated to address bitpixie attacks at all.

This is the hidden content, please
’s attempt to fix this issue was insufficient because of UEFI firmware storage space limitations. Current estimates for new Secure Boot certificates are as far off as 2026. In the interim, users can only protect themselves by backing up BitLocker with their own PIN or disabling network access in the BIOS. Thomas Lambertz warned that even a simple USB network adapter could be enough to execute this attack.

This is unlikely to be a major issue for the everyday user, who is unlikely to have people on-site attempting to decrypt their BitLocker-protected drives. However, for corporate, enterprise, and government environments where cybersecurity is of the utmost importance, full BitLocker decryption is still possible with just a single instance of PC access, and a USB network adapter is undoubtedly a cause for concern.

The CCC is the EU’s largest association of hackers and cybersecurity mediators. For those hungry for more surrounding information and with at least 56 minutes to spare, we recommend the full

This is the hidden content, please
presentation uploaded this morning to CCC’s media hub. The whole talk is in English, unlike prior existing coverage. It gives detailed technical information on how the current exploits work and why they’re so tricky to fix.

Get Tom’s Hardware’s best news and in-depth reviews, straight to your inbox.



This is the hidden content, please

#Hacker #demonstrates #supposedlypatched #Windows #BitLocker #vulnerable #hackers #default #encryption #overcome #network #access

This is the hidden content, please

This is the hidden content, please

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.