Bad news for BitLocker users — its encryption can be cracked remarkable easily (2024)

Bad news for BitLocker users — its encryption can be cracked remarkable easily (1)

If you have a Windows 10 Pro, or Windows 11 Pro device, with a dedicated external Trusted Platform Module (TPM), all of your encrypted data could easily be decrypted and read - all that’s needed is a little brainpower, a $10 Raspberry Pi Pico, and physical access to the target endpoint.

A YouTuber with the alias stacksmashing has demonstrated what they call a “colossal security flaw” which allowed him to bypass Windows Bitlocker in less than a minute and gain access to the encryption keys, all with the help of the off-the-shelf cheap device.

You can read up on the technicalities of the flaw and its exploit here, but the short story is that the communication lanes between the CPU and the external TPM are completely unencrypted on boot-up. So, if an attacker were to have an unpopulated connector on the motherboard that can read LPC bus data, they would be able to connect the Pico to it and have the device read the raw ones and zeros from the TPM. That would grant them access to the Volume Master Key that’s stored on the module.

Major oversight

During their demonstration, stacksmashing used a ten-year-old laptop with Bitlocker encryption, but explained that the same method works on newer motherboards with an external TPM.

The devices with a TPM built into the CPU should be safe (which includes most Intel and AMD CPUs for sale today). In the video, the YouTuber is seen first removing the back cover of a laptop with a screwdriver, before touching the connectors with their Pico device. At the same time, a stopwatch running on a smartphone showed the entire process lasting less than a minute.

While some viewers praised stacksmashing’s findings, saying the tool could be really helpful for people who lost their encryption keys, others suggested that the flaw was a “major oversight”.

Via The Register

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

More from TechRadar Pro

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Most Popular
Bad news for BitLocker users — its encryption can be cracked remarkable easily (2024)

FAQs

Can BitLocker encryption be broken? ›

BitLocker's encryption keys can be stolen with a Raspberry Pi Pico, but the exploit only works with external TPMs using the LPC bus. Most modern hardware integrates the TPM, making it more difficult to extract BitLocker keys. AMD and Intel CPUs are likely safe.

Can the government crack BitLocker? ›

According to Microsoft sources, BitLocker does not contain an intentionally built-in backdoor, so there is no Microsoft-provided way for law enforcement to have guaranteed access to the data on a user's drive.

What makes BitLocker encryption difficult to break? ›

The Trusted Platform Module (TPM) is a hardware component that is used to secure BitLocker encryption. Verify that the TPM is enabled and properly configured in the BIOS settings.

Can Microsoft BitLocker be cracked? ›

Eavesdropping on traffic external TPM

Yet it turns out that this encryption is easy and, more importantly, cheap to crack. According to the ethical hacker, malicious parties can bypass the Bitlocker encryption by directly accessing the hardware and filtering out the encryption keys from the TPM via the LPC bus.

Can you get past BitLocker encryption? ›

That is because the design of BitLocker requires a recovery key to decrypt stored data. Sometimes, users do not have their keys, which complicates the recovery. However, bypassing BitLocker's recovery key and retrieving lost data from an encrypted volume is possible.

Is BitLocker 100% Secure? ›

Not 100% Secure: While BitLocker provides strong protection against most cyber threats, there are some cases where it can be bypassed by malicious actors with sophisticated techniques. As such, organizations must also consider other layers of protection when utilizing this software.

Is BitLocker backdoor? ›

Bitlocker has no backdoors. A bare Bitlocker encrypted drive is fundamentally unhackable.

What would trigger BitLocker? ›

Bitlocker recovery mode can be triggered by a number of situations, including: A malicious attempt by a person or software to change the startup environment. Rootkits are one example. Moving the BitLocker-protected drive into a new computer.

Is BitLocker obsolete? ›

For your data protection needs, Microsoft recommends that you use Microsoft Purview Information Protection and Microsoft Purview Data Loss Prevention. Note: BitLocker to Go as a feature is still supported.

Can the government access your computer? ›

With the ability to track customers' online activities, ISPs can provide governments with detailed records of websites visited, search queries, and even the time of online communications. It can provide a comprehensive overview of an individual's internet usage.

What is the downside to BitLocker? ›

Cons of BitLocker

Asking a nontechnical user to know things about encryption keys and proper storage or backup of these keys is a bit much. Not having the key can lock legitimate users out of their own data and using BitLocker can significantly impact performance (up to 45%) in some cases.

Is it possible to decrypt BitLocker? ›

Users can decrypt a disk using the operating system (the Turn Off BitLocker function). After that, Kaspersky Endpoint Security will prompt the user to encrypt the disk again. Kaspersky Endpoint Security will be prompting to encrypt the disk unless you enable disk decryption in the policy.

What is the BitLocker security flaw? ›

Tracked as CVE-2024-38058, this important severity security flaw can let attackers bypass the BitLocker Device Encryption feature and access encrypted data with physical access to the targeted device.

How much time will it take to decrypt BitLocker? ›

Disabling BitLocker

NOTE: Decryption can take anywhere from 20 minutes to a couple of hours. The time depends on the amount of data that has been encrypted, the speed of the computer, and whether the process is interrupted.

Can BitLocker be defeated? ›

BitLocker encryption can be defeated in seconds, and the key can be sniffed using an external TPM.

What happens if BitLocker encryption is interrupted? ›

If the encryption process was interrupted then the only option may be to fully format the drive by removing the partition and starting again. Unfortunately all data will be lost.

What can go wrong with BitLocker? ›

What Are the Issues With BitLocker?
  • Key Management Complexity. One of the primary concerns with BitLocker revolves around key management. ...
  • Limited Cross-Platform Compatibility. ...
  • Trusted Platform Module (TPM) Dependency. ...
  • Performance Impact. ...
  • Recovery Challenges.
Nov 28, 2023

Can BitLocker encryption be stopped? ›

Turn off Standard BitLocker encryption

Type and search [Manage BitLocker] in the Windows search bar①, then click [Open]②. Click [Turn off BitLocker]③ on the drive that you want to decrypt. If the drive is under locked status, you need to click [Unlock drive] and type the password to turn off BitLocker.

Top Articles
Why we don't have 128-bit CPUs
Netflix Salaries: Paying Top Dollar for Top Talent
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Selly Medaline
Latest Posts
Article information

Author: Dr. Pierre Goyette

Last Updated:

Views: 5770

Rating: 5 / 5 (50 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Dr. Pierre Goyette

Birthday: 1998-01-29

Address: Apt. 611 3357 Yong Plain, West Audra, IL 70053

Phone: +5819954278378

Job: Construction Director

Hobby: Embroidery, Creative writing, Shopping, Driving, Stand-up comedy, Coffee roasting, Scrapbooking

Introduction: My name is Dr. Pierre Goyette, I am a enchanting, powerful, jolly, rich, graceful, colorful, zany person who loves writing and wants to share my knowledge and understanding with you.