Devices protected using Microsoft BitLocker can be physically breached in a new form of attack that involves extracting the encryption keys from a computer’s Trusted Platform Module (TPM) chip.
By hardwiring equipment into a computer’s motherboard, namely the TPM chip, attackers would be primed to access any sensitive corporate information stored on encrypted hard drives. This breed of attack requires an attacker to be in close physical proximity to the target and leads to the device in question being destroyed.
A security researcher from Pulse Security Denis Andzakovic outlined the method in a post published yesterday, including how he would wire up equipment to a target device, and interpret the information he intercepts.
Read more…
Source: ITPro