Share this article
Latest news
With KB5043178 to Release Preview Channel, Microsoft advises Windows 11 users to plug in when the battery is low
Copilot in Outlook will generate personalized themes for you to customize the app
Microsoft will raise the price of its 365 Suite to include AI capabilities
Death Stranding Director’s Cut is now Xbox X|S at a huge discount
Outlook will let users create custom account icons so they can tell their accounts apart easier
Do you think BitLocker is safe? Guess again, it takes less than a minute to break it
It costs less than $10 to bypass BitLocker encryption
3 min. read
Updated onFebruary 8, 2024
updated onFebruary 8, 2024
Share this article
Read our disclosure page to find out how can you help Windows Report sustain the editorial teamRead more
BitLocker is the encryption method of choice for many users since it will protect your data in case your PC gets stolen.
However, it seems that BitLocker isn’t as secure as we previously thought, and it can be bypassed easily with Raspberry Pi Pico.
YouTuber shows how to break BitLocker protection with Raspberry Pi
According toBetanews, it seems that YouTuber stacksmashing managed to bypass BitLocker encryption all by using a Raspberry Pi Pico.
To make matters worse, it only took him 43 seconds to do so, and that includes the necessary time to open the laptop case and access the motherboard!
He has a pretty informative video that shows this in action while explaining the process in detail.
According to the video, he managed to do so by using an unused connector at the back of the laptop motherboard. The connector has the necessary lines to access the TPM, which makes it vulnerable to this type of attack.
To get the BitLocker key, stacksmashing created a small Raspberry Pi Pico board that connects to this connector and retrieves the BitLocker Volume Master key.
After obtaining the master key, you can use one of many available tools to decrypt the drive and access the files.
While this is worrying, there are some precautions you can take to protect yourself. Firstly, you should use preboot authentication with a strong PIN. By doing so, this type of attack will be useless.
Unfortunately, this option isn’t easily accessible, and you can enable it only from Group Policy Editor.
Secondly, this isn’t method isn’t 100% compatible with all laptops. It works usually with Lenovo laptops, as well as other models that have a similar connector. Microsoft Surface Pro is also vulnerable to this type of attack.
The attack also doesn’t work on PCs that have a firmware TPM that is integrated into the CPU, but if your laptop has a dedicated TPM chip, it might be vulnerable.
While this looks extremely troublesome, your PC should be safe as long as you have a preboot authentication enabled or if your device comes with fTPM that is integrated into the CPU, which modern PCs usually do.
This isn’t the only security concern for Microsoft, andMicrosoft is investigating Outlook security vulnerabilityand dealing with theaftermath of the Midnight Blizzard attack, so fixing this probably isn’t at the top of their priorities.
More about the topics:Bitlocker,TPM
Milan Stanojevic
Windows Toubleshooting Expert
Milan has been enthusiastic about technology ever since his childhood days, and this led him to take interest in all PC-related technologies. He’s a PC enthusiast and he spends most of his time learning about computers and technology.
Before joining WindowsReport, he worked as a front-end web developer. Now, he’s one of the Troubleshooting experts in our worldwide team, specializing in Windows errors & software issues.
User forum
0 messages
Sort by:LatestOldestMost Votes
Comment*
Name*
Email*
Commenting as.Not you?
Save information for future comments
Comment
Δ
Milan Stanojevic
Windows Toubleshooting Expert
Before joining WindowsReport, he worked as a front-end web developer. Now, he’s specialized in Windows errors & software issues.