Businesses at risk of data theft through 'classic' cold boot attack
F-Secure warns sensitive data can be scalped from the RAM of lost, stolen or recycled laptops


Most modern computers have a weakness that allows hackers to steal encryption keys and other sensitive data, according to new research.
Cyber security firm F-Secure said it had managed to revive a decades-old attack that involves stealing user data during a computer's reboot process, warning that the majority of modern-day computers are vulnerable to the exploit.
The exploit, known as a cold-boot attack, which has been known to hackers since 2008, involves rebooting a computer without initiating a proper shutdown process, then scalping the residual data that briefly sits on the machine's RAM. While most modern laptops have been designed to overwrite this data by default, the research team was successfully able to disable this overwrite function.
Researchers warn that the attack could mean that businesses risk losing data through machines they have either lost or ditched in recent replacement cycles, and that current security measures are not good enough to protect against the exploit.
"Typically, organisations aren't prepared to protect themselves from an attacker that has physical possession of a company computer," said F-Secure principal security consultant Olle Segerdahl.
"When you have a security issue found in devices from major PC vendors, like the weakness my team has learned to exploit, you need to assume that a lot of companies have a weak link in their security that they're not fully aware of or prepared to deal with."
F-Secure said that although the exploit requires some extra steps to the classic cold boot attack, it's proven to be effective against every modern laptop tested. It added that because the threat is typically used against devices that are stolen or lost, hackers have plenty of time to execute the attack.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Segerdahl also added that there's no reliable way for organisations to know their data is safe if a computer goes missing, and because nearly all company laptops will have things like access credentials for corporate networks, it gives attackers a consistent and reliable way to compromise corporate targets.
Rather worryingly, there is no easy fix for this issue either, but Segerdahl stressed the importance of invalidating access credentials once a machine is reported lost, stolen, or no longer in use.
When contacted by IT Pro, Microsoft senior director Jeff Jones said: "This technique requires physical access to a target device. We encourage customers to practice good security habits, including preventing unauthorized physical access to their device." Crucially, however, there was no mention of a potential fix for the problem.
F-Secure's advice is for businesses to configure laptops so they automatically shut down or hibernate instead of entering sleep mode, or require employees to enter an encrypted system's BitLocker PIN each time they boot up their machines.
Bobby Hellard is ITPro's Reviews Editor and has worked on CloudPro and ChannelPro since 2018. In his time at ITPro, Bobby has covered stories for all the major technology companies, such as Apple, Microsoft, Amazon and Facebook, and regularly attends industry-leading events such as AWS Re:Invent and Google Cloud Next.
Bobby mainly covers hardware reviews, but you will also recognize him as the face of many of our video reviews of laptops and smartphones.
-
Developers aren’t quite ready to place their trust in AI
News AI coding tools are delivering benefits for developers, but they’re still worried about security and compliance
-
Are chief AI officers here to stay?
In-depth Mainstay of the boardroom or short-term project leader, CAIOs are the subject of intense consideration
-
‘A huge national security risk’: Thousands of government laptops, tablets, and phones are missing and nowhere to be found
News A freedom of information disclosure shows more than 2,000 government-issued phones, tablets, and laptops have been lost or stolen, prompting huge cybersecurity concerns.
-
Iranian hackers targeted nuclear expert, ported Windows infection chain to Mac in a week
News Fresh research demonstrates the sophistication and capability of state-sponsored threat actors to compromise diverse targets
-
The top malware and ransomware threats for April 2023
News New ransomware gangs and malware abound as hackers continue to evolve their tactics
-
How we test security software
Reviews Everything you need to know about our benchmarking process for antivirus products
-
Avira Free Security review: An effective antimalware suite, but heavy on the marketing
Reviews It’s hard to fully appreciate Avira’s malware protection when the packaging feels so manipulative
-
Kaspersky Free review: Effective and lightweight – everything you want from a free antivirus solution
Reviews It’ll be a real shame if politics means people missing out on this top-class security tool
-
McAfee Total Protection review: Quick, effective and affordable
Reviews A solid security choice, with perfect malware protection, a fully functional VPN and more
-
AVG Internet Security review: Money for nothing
Reviews An ostensible upgrade from the free Avast package – but there’s very little here to justify the cost