Connect with us

Hi, what are you looking for?


Data Protection

Microsoft Windows Sleep Feature Poses Security Risk

Tool Enables Instant Decryption of TrueCrypt and BitLocker by Analyzing Hibernation File

Tool Enables Instant Decryption of TrueCrypt and BitLocker by Analyzing Hibernation File

A sleep feature in Microsoft Windows may significantly reduce security of full disk encryption, Passware warned today. The Mountain View, California based company claims that the latest version of its Passware Kit makes instant decryption for powered-off computers possible by analyzing a hibernation file which is automatically created when a system enters hibernation. This file (hiberfil.sys) often contains data that may breach computer security, the company says.

If a computer with a mounted TrueCrypt or BitLocker To Go hard disk has hibernated at least once, Passware Kit will instantly decrypt the hard disk even if the computer is no longer running. If the target computer is running, the company’s Passware Kit Forensic 10.3 can decrypt hard disks encrypted with BitLocker or TrueCrypt in a matter of minutes the company claims.

Cracking BitLocker

“The complexity of IT security is not limited to anti-malware, anti-virus, phishing and other actions, but extends to behaviors that exploit little known flaws in operating systems,” said Dmitry Sumin, president of Passware, Inc. 

“This latest version of Passware Kit is the absolute definitive tool for investigators. With the ability to extract encryption keys from a Hiberfil.sys file, there really is nowhere for the bad guy to run,” Andy Malone, CEO and senior technology of quality training (UK) Ltd.

In September the company announced that its software was capable cracking of BitLocker To Go USB Disks, saying it can decrypt “BitLocker To Go” thumb drives in less than 20 minutes.

Hibernation captures everything in memory (RAM) and writes it to your hard disk as the hiberfil.sys file. If you have 1GB of memory, the hiberfil.sys will be about 1GB. Want to delete hiberfil.sys or disable hibernation? Microsoft has some resources here and here that may help.

Advertisement. Scroll to continue reading.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.


The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...