Security researchers have uncovered a new variation of a cold boot attack that can meddle with a computer’s firmware to disable security measures and allow an attacker to recover sensitive data stored on that computer.
The attack is a variation of old cold boot attacks, known for nearly a decade. Cold boot attacks are when an attacker forces a computer reset/reboot and then steals any data left over in the RAM. Over the years, OS makers and hardware vendors have shipped various security measures to reduce the impact of cold boot attacks, even if they happen. But security researchers discovered that they could circumvent one of these protections.
Read more about how current cold boot attack firmware security measures can be disabled to steal sensitive data from high-value computers on ZDNet.