Analysis, commentary, and practical guidance from SALTT Tech's practitioners — including the SALTT Tech Cyber Weekly podcast.

Microsoft researchers have reported a technique, informally dubbed “BitUnlocker”, that enables bypass of BitLocker full volume encryption under specific boot and recovery pre‑conditions. While the discovery appears to require physical access and a particular environmental setup, it is nevertheless a critical reminder that pre‑boot trust, measured boot, and protector selection are the true control points for BitLocker security. This analysis distils the technical implications for engineers, correlates them with known classes of BitLocker bypass (including Secure Boot and WinRE issues), and outlines concrete hardening, detection, and validation steps.
What Microsoft reported and why it matters
According to reporting by iTnews, Microsoft researchers identified a technique—referred to in coverage as “BitUnlocker”—that can bypass BitLocker full volume encryption on affected configurations by manipulating early‑boot conditions and recovery flows to cause the release or re‑use of protected keys without the expected pre‑boot challenge. See the iTnews coverage for the public summary and context: https://www.itnews.com.au/news/bitunlocker-full-volume-encryption-bypass-found-by-microsoft-researchers-619577. While specifics are tightly scoped, the technique belongs to a family of issues where the integrity of the boot chain, recovery environment, or device sleep/hibernate handling can subvert the assumptions BitLocker makes when sealing keys to platform state.
This is significant because BitLocker’s security is not solely about cryptography—it is anchored to platform integrity (TPM PCRs, Secure Boot), pre‑boot authentication, and policy. If an attacker can induce a boot path that is still considered trustworthy by the platform (e.g., a signed but vulnerable or misconfigured component, or a legitimate recovery flow that was not hardened), the TPM may release the Volume Master Key (VMK) to the OS loader, effectively defeating “at rest” assurances. For threat modelling, this pushes focus to ensuring the boot/recovery chain is measured, revocation lists are current, and that additional protectors (TPM+PIN) are in place on high‑risk devices. See Microsoft’s BitLocker overview and threat model foundations: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-overview.
BitLocker protects data by encrypting volume sectors with a Full Volume Encryption Key (FVEK) that is encrypted by a Volume Master Key (VMK). At boot, one or more protectors are used to decrypt the VMK: TPM‑only (keys sealed to PCRs), TPM+PIN, TPM+USB key, or recovery key/password. The Trusted Platform Module (TPM) releases the secret only if the current Platform Configuration Registers (PCRs) match the profile that was defined when BitLocker was provisioned. Typical Windows PCR bindings include measurements of firmware, the boot manager, and Secure Boot state. Refer to the BitLocker technical overview: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-how-it-works and BitLocker group policy details: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-group-policy-settings.
Measured Boot and Secure Boot are foundational. Secure Boot ensures only signed, non‑revoked boot components execute; Measured Boot records the executed code into the TPM’s PCRs. BitLocker’s TPM‑only protector succeeds when the measured components and Secure Boot state match the expected PCR profile. Any attacker who can: (a) execute a Microsoft‑signed but vulnerable boot component that still measures to an acceptable PCR profile, (b) abuse a recovery path with permissive defaults, or (c) leverage sleep/hibernate states to reuse an already‑released VMK, can potentially subvert BitLocker’s pre‑boot assurance. See Microsoft Secure Boot guidance: https://learn.microsoft.com/windows/security/information-protection/secure-boot/secure-boot-overview and NIST SP 800‑164 Rev.2 for platform integrity: https://csrc.nist.gov/publications/detail/sp/800-164/rev-2/final.
Historically, the most robust BitLocker compromises have not broken AES or the on‑disk format but have targeted pre‑boot trust or key residency. Two prominent vectors are: (1) early‑boot component abuse (e.g., loading a signed but exploitable bootloader/boot manager to execute arbitrary code prior to OS), and (2) recovery environment misuse, where WinRE or similar flows automatically unlock or provide a path to offline access under certain policy misconfigurations. Microsoft has previously addressed adjacent issues with Secure Boot revocation updates and WinRE patching guidance to close down bypass routes. For example, see MSRC CVE‑2024‑20666 (Windows BitLocker Security Feature Bypass): https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20666 and Microsoft’s WinRE update guidance for deployed devices: https://learn.microsoft.com/windows/deployment/update/winre.
A separate class of issues arises when the device is in S3 sleep, Modern Standby (S0ix), or hibernation. Once the VMK has been released to RAM, physical attacks such as cold boot can extract remnants of keys, and DMA attacks can read memory if kernel DMA protection is absent or misconfigured. These are not cryptographic failures but operational ones—BitLocker assumes that once unlocked, residual risk is managed by the platform. Engineers should therefore ensure kernel DMA protection is enabled and consider policies to clear TPM keys on sleep or to use pre‑boot authentication to force a user challenge post‑sleep. See Microsoft Kernel DMA Protection guidance: https://learn.microsoft.com/windows/security/information-protection/kernel-dma-protection-for-thunderbolt and F‑Secure’s analysis of cold boot techniques: https://labs.f-secure.com/blog/cold-boot-attacks-are-back/.
Full volume encryption bypasses of the type suggested by “BitUnlocker” almost always require significant prerequisites: physical access, the ability to reboot the device, control over boot media or recovery flows, and either permissive platform state (e.g., outdated DBX revocation list, insecure BootOrder) or a policy that allows recovery environments to mount encrypted volumes without a user challenge. In some enterprise deployments, consumer‑grade Device Encryption (TPM‑only without a pre‑boot PIN) increases exposure by relying entirely on platform integrity and user presence at the Windows logon stage rather than at pre‑boot. See Device Encryption vs BitLocker distinctions: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/device-encryption.
By contrast, configurations using TPM+PIN and verified Secure Boot with a current revocation list substantially raise the bar. Changing boot chain components, shifting to an untrusted WinRE, or introducing vulnerable signed loaders should trip PCR mismatches and force the recovery key, which is typically not available to an opportunistic attacker. The most successful adversaries here are “evil‑maid” attackers with repeated hands‑on time, or well‑resourced actors chaining bootloader vulnerabilities (e.g., the BlackLotus lineage, addressed via certificate revocations) to preserve PCR acceptance while executing arbitrary code. Engineers should treat these as “assume physical access” scenarios and design controls accordingly. For platform integrity background, see NIST SP 800‑155: https://csrc.nist.gov/publications/detail/sp/800-155/final and NIST SP 800‑147: https://csrc.nist.gov/publications/detail/sp/800-147/final.
In TPM‑only deployments, the VMK is sealed to a PCR profile that usually includes PCR[7] (Secure Boot policy) and other PCRs for firmware and boot manager stages. If an attacker can craft a boot path that: (a) remains signed and not revoked (thus, Secure Boot accepts it), and (b) does not alter the PCRs beyond the accepted deltas, the TPM will unseal the VMK to the OS loader. Historically, this has been attempted by bootstrapping older, vulnerable Microsoft‑signed components, which is why revocation updates (DBX) are critical. Administrative policy can also alter the PCR profile to exclude certain measurements (e.g., for compatibility), weakening the binding. See Microsoft guidance on BitLocker PCRs and platform validation considerations within the BitLocker docs: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-overview (section: Platform validation and TPM).
WinRE introduces another axis. Depending on how recovery is invoked and how the image is built, it may inherit trust sufficient to mount encrypted volumes—especially if the environment is legitimate but not fully updated or if the deployment uses convenience features that auto‑unlock OS volumes for repair. Microsoft has published multiple advisories and guidance to update WinRE images on deployed devices to address security issues and harden behaviour (see https://learn.microsoft.com/windows/deployment/update/winre). Failing to keep WinRE current or allowing unsigned, sideloaded recovery images can result in a recovery path that effectively bypasses the intended pre‑boot challenge.
From a detection standpoint, focus on events around boot, BitLocker protector changes, and WinRE entry. Windows logs BitLocker activity under the Microsoft‑Windows‑BitLocker‑Driver provider; look for events indicating protector addition/removal, recovery usage, or auto‑unlock behaviour. Boot integrity events (e.g., under Microsoft‑Windows‑Kernel‑Boot and CodeIntegrity/Operational) can reveal Secure Boot state changes or unexpected boot path components. Where Microsoft Defender for Endpoint (MDE) is present, configure alerts for boot configuration changes, new boot entries (BCDEdit modifications), and WinRE image tampering. Reference: BitLocker operations and GPO auditing in BitLocker docs: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-group-policy-settings.
DFIR should acquire: (1) UEFI NVRAM variables (db, dbx, boot order), (2) the WinRE WIM and its signature metadata, (3) BCD stores (both system and recovery), (4) the BitLocker metadata (FVE metadata), and (5) memory if the device was captured in an unlocked state. If the volume was unlocked at collection time, keys may be recoverable from RAM; preserve the hibernation file (hiberfil.sys) and pagefile if feasible for post‑mortem key hunting. While specific third‑party tooling varies, the key point is to document whether the VMK was unsealed during incident handling. Compare PCR quotes across boots if Remote Attestation is in use (e.g., via TPM attestation APIs) to detect drift in measured components. For background on cold boot forensics and risks of key residency, see F‑Secure’s analysis: https://labs.f-secure.com/blog/cold-boot-attacks-are-back/.
The most impactful mitigations are: (1) enforce TPM+PIN for portable endpoints and all devices at elevated risk; (2) ensure Secure Boot is enabled with an up‑to‑date DBX revocation list; (3) keep WinRE images patched per Microsoft guidance; (4) disable or strictly control external boot; (5) enable Kernel DMA Protection; and (6) manage sleep/hibernate behaviour so that keys are not left resident in RAM in unattended contexts. Microsoft’s BitLocker countermeasures page captures many of these programme‑level controls: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-countermeasures and WinRE update guidance for deployed devices: https://learn.microsoft.com/windows/deployment/update/winre.
For high‑sensitivity systems, add: pre‑boot authentication with complex PINs; configure the TPM platform validation profile to include critical PCRs; disable hibernate, and require power‑on authentication after sleep; enforce WDAC for boot‑time components; and rotate recovery keys periodically. Avoid hardware self‑encrypting drive (SED) “opportunistic” offload unless explicitly validated; multiple SEDs have had firmware weaknesses that bypassed hardware encryption enforcement. The Radboud University study on SED vulnerabilities remains a cautionary tale: https://www.ru.nl/en/news/radboud-university-finds-vulnerabilities-in-self-encrypting-ssd.
Validation should be hands‑on and automated. In a lab, confirm that altering any early‑boot component (e.g., temporarily toggling Secure Boot, introducing an out‑of‑date bootloader, or booting into a stock WinRE) triggers BitLocker recovery on TPM‑only devices; if it does not, investigate PCR binding and policy. Verify DBX currency with PowerShell (e.g., confirm presence of recent Secure Boot revocations) and test that unauthorised external boot media are blocked. Ensure that recovery images are signed and updated and that custom WinRE images do not silently auto‑mount the OS volume. Reference Secure Boot overview and administrative controls: https://learn.microsoft.com/windows/security/information-protection/secure-boot/secure-boot-overview.
At scale, use configuration compliance (e.g., Microsoft Intune or Group Policy) to assert: Secure Boot = enabled, DMA Protection = on, BitLocker = enabled with TPM+PIN for mobiles, hibernate policies = hardened, external boot = disabled, and BitLocker network unlock disabled unless strictly necessary. Telemetry should track BitLocker protector inventory per device, recent recovery triggers, and WinRE version drift versus a golden baseline. For programme documentation and policy references, see Microsoft BitLocker GPO settings: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-group-policy-settings and Device Encryption vs. BitLocker design notes: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/device-encryption.
Governance should mandate: pre‑boot auth for defined device classes; scheduled WinRE maintenance; DBX revocation updates as a change‑managed process; and mandatory rotation of BitLocker recovery keys after any recovery event or platform‑state anomaly. Recovery keys must be escrowed in secure directories (e.g., Azure AD/Entra ID or Active Directory) with access logging and PAM controls, and their retrieval should be a privileged, audited workflow. See BitLocker key protection and enterprise management considerations within the BitLocker docs: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-overview.
Establish an attestation baseline: record PCR composites, Secure Boot state, and boot component versions for standard images; configure alerting on drift. For vendors, demand UEFI updates and revocation distribution SLAs. Finally, include sleep/hibernate policy as part of risk acceptance: devices handling regulated data should clear keys on sleep or require pre‑boot challenges upon resume. Align with NIST SP 800‑164 Rev.2 for ongoing platform integrity management: https://csrc.nist.gov/publications/detail/sp/800-164/rev-2/final.
30 days: inventory BitLocker protector types; enforce TPM+PIN for high‑risk devices; verify Secure Boot is enabled; audit and update WinRE images fleet‑wide; validate Kernel DMA Protection; and block external boot. Publish guidance for incident responders on preserving boot artefacts and RAM when encountering suspected BitLocker bypasses. Reference: BitLocker countermeasures programme: https://learn.microsoft.com/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-countermeasures and WinRE update process: https://learn.microsoft.com/windows/deployment/update/winre.
60 days: complete DBX revocation validation; implement automated compliance checks (MDE/Intune/GPO) for boot integrity, DMA, sleep/hibernate policies, and protector types; rotate recovery keys where recovery has occurred; and roll out attestation baselining for PCRs. 90 days: require pre‑boot authentication for mobiles and privileged endpoints; codify a recurring WinRE and firmware maintenance window; and run red‑team tabletop/lab exercises to verify that boot/recovery manipulations consistently lead to recovery prompts, never silent unlock.
Deepfake technology, though impressively innovative, poses serious threats to both individuals and businesses on a global scale. These threats stem primarily from the technology's ability to convincingly mirror one's image, voice, and often, personal demeanour. This ability turns deepfakes into effective tools for cyberattacks, especially in the domain of social engineering.
Understanding the Deepfake Phenomenon
Deepfake technology involves the use of artificial intelligence techniques, notably machine learning algorithms, to fabricate or manipulate digital content so as to produce hyper-realistic false data. Often, these are videos or audio files that convincingly impersonate individuals, sometimes internationally recognised personalities.
The real concern, however, arises from those malicious actors who capitalise on the technology's power to orchestrate nefarious deeds. These range from misinformation campaigns and public reputation damage, to identity theft and fraud - all potentially catastrophic issues, on both individual and societal levels.
Cybersecurity Threats Posed by Deepfakes
The rapidly evolving landscape of deepfake technology brings with it an escalating wave of cybersecurity threats. There are two broad ways to classify these threats: First, those directed at individuals and their identities, and second, those aimed at public figures and organisations.
In the personal domain, deepfake attacks may focus on defrauding or blackmailing individuals. In the realm of organisations, deepfakes can be exploited to tarnish company reputations, disrupt market dynamics, or even compromise security by fooling biometric scanning systems. Furthermore, as with many other cyber threats, deepfakes continue to evolve unpredictably, potentially outpacing prevention and response measures.
Defensive Strategies Against Deepfake Threats
Given the significant and escalating challenges deepfake technology poses, it's necessary for individuals and businesses alike to be proactive in their defensive strategies. The first step in creating a robust defensive system is to promote awareness about deepfakes, their capabilities, and their potential harm. Just as crucial is training staff in recognising potential deepfakes, particularly when they seek to imitate senior personnel or trusted contacts.
Furthermore, technical countermeasures are essential which include implementing advanced security architectures able to detect inconsistencies and discrepancies characteristic of deepfakes. These might range from chain-of-trust systems to validate digital content, to machine learning models trained explicitly to detect deepfakes. Lastly, staying abreast with the latest developments in the field of deepfakes can provide early warnings of new threats or vulnerabilities.
KnowBe4 has launched an interactive and exciting way to learn cyber security in a relaxed environment, in the form of a game called 'Hack-A-Cat'. The intention is to lighten up the otherwise serious world of cybersecurity and make it more approachable to beginners. The game involves seven challenges based on practical security principles.
Understanding 'Hack-A-Cat'
Unlike typical topics covered in KnowBe4’s security awareness training, the 'Hack-A-Cat' game deviates from regular training videos or slide shows. This engaging game empowers users to sharpen their cybersecurity skills and knowledge by completing different challenges preferring a more hands-on approach.
Game on Roblox Platform
'Hack-A-Cat' is a part of the Roblox platform, an online game platform and game creation system that allows users to program games and play games created by other users.
Hack-A-Cat Challenges
The game encompasses seven challenges derived from practical security principles, granting both newcomers and seasoned professionals an opportunity to learn and reinforce cybersecurity concepts in a fun environment.
Importance of Cybersecurity Education
Considering the rising threats in the digital world, the need for cybersecurity education and awareness is greater than ever. 'Hack-A-Cat' offers a novel way to make learning about cybersecurity accessible and enjoyable for all.
Cybersecurity professionals across industries are diligently working to counteract a rising tide of cyber threats powered by next-generation technologies. Notably, artificial intelligence (AI) has been considerably weaponized by cybercriminals, leading to an alarmingly high volume of sophisticated attacks. According to recent data presented by KnowBe4, a cybersecurity awareness training company, a shocking 91% of cybersecurity professionals experienced cyber attacks that use AI in the past year.
AI-Powered Cyber Threats: The New Norm
The noted figure from KnowBe4's findings reveals a hard truth about the modern cyber threat landscape: AI-driven attacks are no longer an exception but are increasingly becoming the norm. These attacks often blend elements of automation, machine learning, and advanced algorithms, allowing cybercriminals to execute widespread, high-speed, and highly targeted activities that conventional security measures often struggle to counter effectively.
The Conundrum of AI in Cybersecurity
AI is undoubtedly a double-edged sword in the cybersecurity sector. While there are significant potential benefits to utilizing AI for enhanced security measures and protection, cybercriminals are also exploiting this advanced technology to launch increasingly sophisticated attacks. As a result, the very tool we rely upon to bolster our defenses is turning into a formidable weapon in the hands of online adversaries. This AI paradox poses a monumental challenge for cybersecurity professionals worldwide.
The Efficacy of Current Defensive Strategies
Understandably, the rise of AI-driven cyber threats brings into question the effectiveness of the current defensive strategies. Are our traditional cybersecurity measures sufficient to combat these AI-powered threats? Disturbingly, the answer seems to lean towards a resounding 'no.' At least for now, our legacy defenses are struggling to keep pace with the threat landscape's evolution.
91% of the surveyed professionals who experienced AI-based attacks suggest the urgent need for organizations to reassess and fortify their cybersecurity strategies. It is a strong indicator that the adoption of next-generation cybersecurity technologies has become a necessity rather than an option.
The Road Ahead: Strengthening Our Cyber Defenses
Remaining one step ahead of cybercriminals is now more crucial than ever. To tackle the rising AI-powered cyber threats effectively, we must ramp up efforts in adopting new, innovative defensive strategies that use advanced technologies like AI and machine learning.
Furthermore, organizations across sectors must invest in comprehensive cybersecurity awareness training. Since humans remain the weakest link in cybersecurity, upgrading employees' knowledge and skills can go a long way in countering cyber threats.
Concluding Thoughts
With the mounting threats of AI-powered cyber attacks, it is high time we rethink our security protocols and elevate our defense capabilities. Diversifying our defensive strategies, adopting next-gen cyber technologies, and investing in cybersecurity education will be fundamental to meet the evolving cyber threats head-on.
Remember, cybersecurity is a shared responsibility, and we all have a crucial role to play. Stay safe in the digital world and keep learning, because knowledge is our best defense! Stay tuned for more such updates about the latest developments and trends in cybersecurity.
Web application and API protection is a critical aspect of maintaining the security and integrity of online systems. These systems, which include web applications and APIs, are vulnerable to a variety of cyber threats, such as SQL injection attacks, cross-site scripting (XSS) attacks, and DDoS attacks. To protect against these threats, organisations must implement robust security measures, such as web application firewalls (WAFs), API security gateways, bot detection & fraud mitigation.
In December 2022, it was reported that LastPass and Okta, two popular password management and single sign-on (SSO) platforms, had both suffered data breaches. The breaches highlight the importance of staying vigilant when it comes to online security and taking proactive measures to protect yourself.