Sad when MS’s version is better in just about every way.
Free as in Whoops!
daaaammmn. Nuke from orbit, just to be sure.
Cold boot attacks, in which memory chips can be chilled and data including encryption keys plundered, were demonstrated way back in 2008 – but they just got automated.
That original type of attack has been improved and automated in the form of a memory-pilfering machine that can be yours for around $2,000, with a bit of self-guided electrical fiddling.
[…]
Cold boot attacks can be countered with physical memory encryption, Cui said.
“In modern sort of CPUs, and also in game consoles, they’re actually already using full encrypted memory,” Cui explained. “That would defeat this approach, because even if we were able to rip the physical memory, we would still need to have the physical key, which is somewhere else in the device.”
_“But the more important a thing is for the world, the less security it has,” he said. “So guess what has [memory encryption]? XBox has it. PS5 has it. Guess what doesn’t? Every PLC [programmable logic controller] CPU on the planet effectively. A lot of the critical infrastructure embedded things that we depend on, almost none of them are addressing this kind of attack.” _
Follow up
Millions of people in Louisiana and Oregon have had their data compromised in the sprawling cyberattack that has also hit the US federal government, state agencies said late Thursday.
The breach has affected 3.5 million Oregonians with driver’s licenses or state ID cards, and anyone with that documentation in Louisiana, authorities said. The Louisiana governor’s office did not put a number on the number of victims but over 3 million Louisianians hold driver’s licenses, according to public data.
tl;dr: Don’t expose Microsoft RDP to the Internet.
Not exactly a hack vulnerability, more a design vulnerability.
Wow. And it has a £1749 starting price in the UK…