According to security firm F-Secure, almost every computer is vulnerable to Cold Boot Attacks. Shutting down your laptop properly, or using hibernation and pre-boot authentication offer the best protection. At the heart of this attack is the way computers manage RAM via firmware. Cold boot attacks aren’t new — the first ones came along in […]
According to security firm F-Secure, almost every computer is vulnerable to Cold Boot Attacks.
Shutting down your laptop properly, or using hibernation and pre-boot authentication offer the best protection.
At the heart of this attack is the way computers manage RAM via firmware. Cold boot attacks aren’t new — the first ones came along in 2008. Back then, security researchers realized you could hard reboot a machine and siphon off a bit of data from the RAM. This could include sensitive information like encryption keys and personal documents that were open before the device rebooted. In the last few years, computers have been hardened against this kind of attack by ensuring RAM is cleared faster. For example, restoring power to a powered-down machine will erase the contents of RAM, ExtremeTech reported.
The new attack can get around the cold boot safeguards because it’s not off — it’s just asleep. F-Secure’s Olle Segerdahl and Pasi Saarinen found a way to rewrite the non-volatile memory chip that contains the security settings, thus disabling memory overwriting. After that, the attacker can boot from an external device to read the contents of the system’s RAM from before the device went to sleep.
You can see the process in the video below. It’s obviously quite involved, but an experienced attacker could get it done in a matter of minutes. F-Secure’s description of the attack seems intentionally vague on how exactly you modify the firmware security, but we are assured it’s “simple.” Perhaps the one saving grace here is that someone needs to have physical access to your computer and enough time to take it apart in order to steal any data. Some computers aren’t very easy to disassemble these days, either.
F-Secure says there’s no easy fix for PC vendors — there will always be ways to pull data out of RAM with the right methods. However, end users and businesses can change their practices to limit the impact of cold boot attacks. Using firmware passwords can harden computers, and just closing the lid on a laptop is risk. Rather than letting computers go to sleep, F-Secure recommends using hibernation. Hibernation will clear encryption keys from RAM, but other files could still be at risk. Shutting your computer all the way off is still the best defense.