Service receive & sending SMS

Hacking any laptop by freezing a chip

1658   |     /   Security

Hacking any laptop by freezing a chip
Over ten years ago, security researchers demonstrated a hacking technique called “cold boot.” Surprisingly, this method is still effective against laptops that are sold today and maybe even yours.

We recommend buying a virtual number for receiving SMS and registering (confirming) accounts on unverified sites through purchased virtual numbers.

You may have already read about cold attacks. In 2013, researchers threw the Samsung Galaxy Nexus in the freezer to prepare it for an attack. This week, the F-Secure duo from Helsinki showed a similar hack on Lenovo's laptop. Researchers Olle Segerdahl and Pasi Saarinen used a cold attack to steal system encryption keys.

Do not weaken your protection just because Segerdal and Saarinen decide to attack the Lenovo laptop, and you accidentally have a different brand of computer. The technique they used could theoretically be used against any laptop on the market, including Apple.

While your laptop is in sleep mode, when you close the lid or after a certain period of inactivity, it is probably vulnerable. This is how their attack works.

Instead of putting the entire laptop in the refrigerator, F-Secure used a more selective cooling process. The bottom cover of the laptop was removed, and the system’s RAM was quickly cooled using a can of compressed air. Notice, not just dropping it with air, turn it over and direct liquid fluorocarbons into the chip.

Once the chip has cooled sufficiently, a second phase of attack may begin. A specialized (but fairly common) device allows them to manipulate non-volatile system memory. As soon as the tool does its job, the attacker instructs the computer to boot from the USB drive. Any data that was saved in memory when the computer went into sleep mode is now available. In this case, the hacker can reset the "secret password".

How to protect yourself from cold attacks

No matter how dangerous they may be, cold start attacks are not so difficult to defend. One of the simplest protections is to transfer the PC not to sleep mode, but to hibernation. Hibernation does not leave the same digital traces in memory as a dream, which neutralizes the attack. Setting a pre-boot password on your computer adds another layer of protection.

It is important to be prepared, no matter how you think, the likelihood that you will be subjected to a cold boot attack. “Planning these events is better than assuming that hackers cannot physically compromise the devices, because this is clearly not the case,” Segerdal notes.

Similar news

This simple attack will crash your iPhone or Mac.

The Internet can be an insidious place. If you are an iPhone, iPad or Mac user, there is a whole new attack that you need to pay attention to. Surprisingly, it only contains 15 lines of code.

MacOS Mojave Update Privacy Hack

Apple has begun distributing the macOS Mojave update to its users. It introduces a number of enhancements and new features, and Apple reiterated its commitment to user privacy.

Uber pays $ 148 million. To solve the 2016 data hacking nightmare.

In 2014, hackers broke into the Uber computer network. The story repeated in 2016, only the second time it was much worse. It was a catastrophic event when hackers gained access to private data about 57 million people.


This is not only a service for receiving and sending SMS messages to virtual numbers, but also a tutorial on user safety in the modern world, the latest developments in IT, social media security, fresh programs and lessons that simplify our lives. So are other issues encountered by the average user. In simple words, each user will find for themselves something interesting or answers to their questions.

SIMonline © 2018 - 2024

All rights reserved