Navigation
Search
|
Flaws in Self-Encrypting SSDs Let Attackers Bypass Disk Encryption
Monday November 5, 2018. 10:05 PM , from Slashdot
An anonymous reader writes: Researchers have found flaws that can be exploited to bypass hardware encryption in well known and popular SSD drives. Master passwords and faulty standards implementations allow attackers access to encrypted data without needing to know the user-chosen password. SSDs from Micron (Crucial) and Samsung are affected. These are SSDs that support hardware-level encryption via a local built-in chip, separate from the main CPU. Some of these devices have a factory-set master password that bypasses the user-set password, while other SSDs store the encryption key on the hard drive, from where it can be retrieved. The issue is worse on Windows, where BitLocker defers software-level encryption to hardware encryption-capable SSDs, meaning user data is vulnerable to attacks without the user's knowledge. More in the research paper.
Read more of this story at Slashdot.
rss.slashdot.org/~r/Slashdot/slashdot/~3/u-YKWBkGQzQ/flaws-in-self-encrypting-ssds-let-attackers-byp...
|
25 sources
Current Date
Nov, Thu 21 - 16:25 CET
|