Commercial tool nabs BitLocker, Truecrypt passwords

Powered by SC Magazine
 

Uses existing FireWire attack.

A Russian forensics outfit has launched a tool to pluck passwords used in Microsoft BitLocker, Symantec PGP whole disk encryption and TrueCrypt.

Decryption keys were extracted from the software when encrypted volumes were mounted, including when the Windows machines were powered off.

The FireWire attacks the tool used evolved thanks to security research efforts first detailed as far back as 2004 (pdf). 

 

It allowed attackers to dump a machine's memory via Direct Memory Access, a specification of FireWire that taps into system memory.

Russian forensics outfit ElcomSoft built the attacks into its commercial tool, essentially simplifying the process.

Chief executive Vladimir Katalov said in a blog FireWire drivers must be disabled to safeguard against the attacks.

"It’s important that encrypted volumes are mounted at the time a memory dump is obtained or the PC goes to sleep; otherwise the decryption keys are destroyed and the content of encrypted volumes cannot be decrypted without knowing the original plain-text password," Katalov said.

"... keys used to encrypt and decrypt data that’s being written or read from protected volumes are kept readily accessible in the computer’s operating memory [and] can be retrieved near instantly."

"In order to access the content of encrypted containers, we must retrieve the appropriate decryption keys. Elcomsoft Forensic Disk Decryptor can obtain these keys from memory dumps captured with one of the many forensic tools or acquired during a FireWire attack."

He said the "unique feature" of the toll was that it could "mount encrypted disks as a drive letter using any and all forensic tools to quickly access the data".

It used freely-available tools to mount the attacks.

Copyright © SC Magazine, Australia


Commercial tool nabs BitLocker, Truecrypt passwords
 
 
 
Top Stories
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 311

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 118

Vote