1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Flaws in Popular Self-Encrypting SSDs Let Attackers Decrypt Data

Discussion in 'Security and Privacy' started by Arie, 2018/11/06.

  1. 2018/11/06
    Arie

    Arie Administrator Administrator Staff Thread Starter

    Joined:
    2001/12/27
    Messages:
    15,174
    Likes Received:
    412
    Security researchers have discovered multiple critical vulnerabilities in some of the popular self-encrypting solid state drives (SSD) that could allow an attacker to decrypt disk encryption and recover protected data without knowing the password for the disk.

    Since Windows' built-in BitLocker full-disk encryption software by default uses hardware-based encryption if available, instead of its own software-based encryption algorithms, Windows users relying on BitLocker and using vulnerable drives remain exposed to those vulnerabilities.

    Read More
     
    Arie,
    #1
  2. 2018/11/06
    Bill

    Bill SuperGeek WindowsBBS Team Member

    Joined:
    2002/01/11
    Messages:
    3,371
    Likes Received:
    412
    It should be noted the bad guys must have physical access to these SSDs. It is not a vulnerability they can exploit remotely, or via malware. They have to have physical possession of the drives. Note in that The Hacker News article where it says, (my bold underline added)
    Or in this Bit-Tech article on the same vulnerability, note where it says, (again, my bold underline added)
    That's a BIG IF!

    I am not trying to minimize this issue. It is definitely worrisome as some users choose SSDs over hard drives just because of the integrated hardware based encryption. But again, to exploit this vulnerability, a bad guy would have to be inside your home or place of business. He would then have to steal your computer, or take the time to open it and take the SSD - all without getting caught. And then, take the time to decrypt the personal files on your drive, in the hopes there might be some valuable information they can sell or use against you.

    That's a lot of work for someone probably looking for drug money - unless you (or your company) are being targeted specifically. If you are being specifically targeted by badguys, law enforcement (or foreign spies! :eek:) you have bigger problems to deal with.

    For most home consumers, the lessons learned are to (1) keep current backups of your data, and (2) run "Secure Erase" on your SSDs before you get rid of them - just as you should keep current backups and "wipe" your hard drives before getting rid of them.
     
    Bill,
    #2

  3. to hide this advert.

  4. 2018/11/06
    Admin.

    Admin. Administrator Administrator Staff

    Joined:
    2001/12/30
    Messages:
    6,687
    Likes Received:
    107
    Bill likes this.
  5. 2018/11/06
    Bill

    Bill SuperGeek WindowsBBS Team Member

    Joined:
    2002/01/11
    Messages:
    3,371
    Likes Received:
    412
    Very true. And like I said, I am not trying to minimize the issue. But I contend the vast majority of those "lost" notebooks didn't end up with their data stolen. The lost notebook just found new homes and were used by the new owners who simply overwrote the data. And of course, hard to blame the SSD when the fault is really due to user carelessness and inaction.

    And I think the majority of notebooks still come with hard drives.
     
    Bill,
    #4
  6. 2018/11/06
    Arie

    Arie Administrator Administrator Staff Thread Starter

    Joined:
    2001/12/27
    Messages:
    15,174
    Likes Received:
    412

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.