
Breached BitLocker: Hold Firm on Current Security

Breached BitLocker: Hold Firm on Current Security
Quick Links
Key Takeaways
- BitLocker’s encryption keys can be stolen with a Raspberry Pi Pico, but the exploit only works with external TPMs using the LPC bus.
- Most modern hardware integrates the TPM, making it more difficult to extract BitLocker keys. AMD and Intel CPUs are likely safe.
- Despite the exploit, BitLocker’s AES-128 or AES-256 encryption is still secure, so there’s no need to abandon it.
Microsoft’s BitLocker is one of the most popular full-disk encryption tools, and is built into Windows 10 and 11 Pro providing an easy encryption option for millions of Windows users worldwide. But BitLocker’s reputation as a leading encryption tool could be under threat after a YouTuber successfully stole encryption keys and decrypted private data in just 43 seconds—using a Raspberry Pi Pico costing $6.
How Was BitLocker’s Encryption Broken?
BitLocker’s encryption was broken by YouTuber Stacksmashing, who posted a video detailing how he intercepted BitLocker data, extracted decryption keys, and successfully exploited the BitLocker encryption process.
Stacksmashing’s exploit involves the external Trusted Platform Module (TPM)—the same TPM chip that stops Windows 11 upgrades—found on some laptops and computers. While many motherboards integrate the TPM chip and modern CPUs integrate the TPM into their design, other machines still use an external TPM.
Now, here’s the issue and the exploit discovered by Stacksmashing. External TPMs communicate with the CPU using what’s known as an LPC bus (Low Pin Count), which is a way for low-bandwidth devices to maintain communication with other hardware without creating a performance overhead.
However, Stacksmashing found that while the data on the TPM is secure, during the boot-up process, the communication channels (the LPC bus) between the TPM and CPU are completely unencrypted. With the right tools, an attacker can intercept data sent between the TPM and CPU containing insecure encryption keys.
Tools like the Raspberry Pi Pico, the minute $6 single-board computer that has a bunch of uses. In this case, Stacksmashing connected a Raspberry Pi Pico to unused connectors on a test laptop and managed to read the binary data as the machine booted. The resulting data contained the Volume Master Key stored on the TPM, which he could then use to decrypt other data.
Is It Time to Ditch BitLocker?
Interestingly, Microsoft was already aware of the potential for this attack. However, this is the first time a practical attack has surfaced at large, illustrating just how fast BitLocker encryption keys can be stolen.
It raises the vital question of whether you should consider switching to a BitLocker alternative, like the free and open-source VeraCrypt . The good news is that you don’t need to jump ship for a few reasons.
First, the exploit only works with external TPMs that request data from the module using the LPC bus. Most modern hardware integrates the TPM. While a motherboard-based TPM could theoretically be exploited, it would require more time, effort, and an extensive period with the target device. Extracting BitLocker Volume Master Key data from a TPM becomes even more difficult if the module is integrated into the CPU.
AMD CPUs have integrated TPM 2.0 since 2016 (with the launch of AM4, known as fTPM), while Intel CPUs integrated TPM 2.0 with the launch of its 8th Generation Coffee Lake CPUs in 2017 (known as PTT). Suffice to say, if you’re using a machine with an AMD or Intel CPU manufacturer after those dates, you’re most likely safe.
It’s also worth noting that despite this exploit, BitLocker remains secure, and the actual encryption underpinning it, AES-128 or AES-256, is still secure.
Also read:
- '21 Vegas Pro's Impact on Sports Betting Analysis for 2024
- [New] How to Create a Live Stream on YouTube With the Best Webcams
- [New] In 2024, Igniting Interest How to Elevate Your Instagram Content's Impact
- [New] Master the Art of Fast Instagram Videos for 2024
- [New] The Essentials of Audio Feature Insertion for PPTs for 2024
- [Updated] 2024 Approved Precision Videoplayers for High Definition on Android
- [Updated] In 2024, Crafting Engaging YouTube Videos Using FinalCut Pro Expertise
- [Updated] Understanding Auto HDR and Smart Exposure Techniques in Photos
- Clear the Clutter: Updating and Refreshing Outdated Windows Tech
- Fixing Internal Audio Problems with Audacity (Windows 11)
- In 2024, Short Form Content Breakdown Now!
- Keyboard Troubles? Here's a List of Solutions to Rescue Ineffectual Shortcuts in Windows
- Mastering Error-Free: 0X80072AF9 Corrections
- Reducing Chromium Noise on Your Windows PC
- Stepwise Procedure: Elevating to VirtualBox Version 7.0 on Windows 11
- Top 10 Enterprise Cloud Options for 2024
- Tweaking Pixel Density on Win11
- Unpacking: Decoding the Red X in Windows Explorer
- Wi-Fi Adapter No More: Windows 802.11N Resolved by Broadcom
- Title: Breached BitLocker: Hold Firm on Current Security
- Author: Richard
- Created at : 2025-01-21 19:22:47
- Updated at : 2025-01-24 16:37:48
- Link: https://win11-tips.techidaily.com/breached-bitlocker-hold-firm-on-current-security/
- License: This work is licensed under CC BY-NC-SA 4.0.